| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EURS / USDC | curve | 0x98a7...eb8b | 1.2123160516 |
| EUROC / EURS / EURQ | curve | 0x48ed...63d4 | 1.18067437907437 |
| agEUR / EURT / EURS | curve | 0xb944...d571 | 1.124343794 |
| CM / EURS | uniswap_v2 | 0x8178...c40d | 1.19703789824742 |
| EURS / sEUR | curve | 0x0ce6...7caa | 1.2158780267 |
| EURO / EURS | uniswap_v2 | 0xf3fb...a875 | 1.21865350443552 |
| EURS / USDC 0.05% | uniswap_v3 | 0xbd5f...97f5 | 2.695966319637277206212482752769342619189154358275171436745 |
| EURS / USDC | uniswap_v2 | 0x7670...332f | 1.1940272135 |
| EURS / USDC | sushiswap | 0x41b3...fa58 | 1.2529502277 |
| PAR / EURT / EURS / sEUR | curve | 0x3cfa...2243 | 1.2190613803 |
| EURS / WETH | uniswap_v2 | 0x7cc3...01e9 | 1.2229702443 |
| EURS / crvFRAX | curve | 0x4cc9...927a | 1.1493509468 |
| AMS / EURS 0.3% | uniswap_v3 | 0xacb0...48e0 | 1.12223743579141 |
| EURS / USDC 0.3% | uniswap_v3 | 0x816f...2ea1 | 0.104197131719470706879747092769875983819121160862929906438756296758 |
| EURS / USDT | uniswap_v2 | 0x885e...e1b5 | 0.95922646769281135303799846338565685043760767096575040907826628074819421912827327197347598795952 |
| EURS / WETH 0.3% | uniswap_v3 | 0x277a...8ab1 | 0.009213980354939206151415693652866272320069290083 |
| EUROC / EURS 1% | uniswap_v3 | 0xa2e0...7cac | 1.09214823883252 |
| EURS / WETH | sushiswap | 0xece0...fdda | 0.0112023547370842 |
| EURS / [invalid] | uniswap_v2 | 0xa21f...cad4 | |
| FLR / EURS | curve | 0xfc8c...0ff0 | 1.06623198305523 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.