Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
EURS / USDC | curve | 0x98a7...eb8b | 1.0813761863212 |
agEUR / EURT / EURS | curve | 0xb944...d571 | 1.07827832958012 |
EURS / sEUR | curve | 0x0ce6...7caa | 1.08137908871485 |
EURS / WETH | uniswap_v2 | 0x7cc3...01e9 | 1.07289534838017 |
EURS / USDC | uniswap_v2 | 0x7670...332f | 1.07553728018113 |
EURO / EURS | uniswap_v2 | 0xf3fb...a875 | 1.05495930187619 |
PAR / EURT / EURS / sEUR | curve | 0x3cfa...2243 | 1.10244027135638 |
EURS / USDC 0.05% | uniswap_v3 | 0xbd5f...97f5 | 2.695966319637277206212482752769342619189154358275171436745 |
CM / EURS | uniswap_v2 | 0x8178...c40d | 1.0262934554 |
EURS / USDC | sushiswap | 0x41b3...fa58 | 1.0503954386 |
EURS / crvFRAX | curve | 0x4cc9...927a | 1.04260838039424 |
AMS / EURS 0.3% | uniswap_v3 | 0xacb0...48e0 | 1.12223743579141 |
EURS / USDC 0.3% | uniswap_v3 | 0x816f...2ea1 | 0.104197131719470706879747092769875983819121160862929906438756296758 |
EURS / USDT | uniswap_v2 | 0x885e...e1b5 | 0.95922646769281135303799846338565685043760767096575040907826628074819421912827327197347598795952 |
EURS / WETH 0.3% | uniswap_v3 | 0x277a...8ab1 | 0.009213980354939206151415693652866272320069290083 |
EUROC / EURS 1% | uniswap_v3 | 0xa2e0...7cac | 1.09214823883252 |
EURS / WETH | sushiswap | 0xece0...fdda | 0.0112023547370842 |
EURS / [invalid] | uniswap_v2 | 0xa21f...cad4 | 1.02652181066315941044981225302381455429520893129370431380901419717126491344412021750703372180102093053286 |
FLR / EURS | curve | 0xfc8c...0ff0 | 1.06623198305523 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.