| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PYUSD / USDS | curve | 0xa632...fc1f | 0.990948696691408 |
| USDT / USDS | uniswap-v4-ethereum | 0x3b1b...d5b9 | 1.00112940990097 |
| USDS / SKY | uniswap_v2 | 0x2621...9e3c | 1.0033813574 |
| PYUSD / USDS | uniswap-v4-ethereum | 0xe63e...5d45 | 0.994998230355637 |
| USDS / stUSDS | curve | 0x2c7c...78ae | 0.9898254277 |
| USDT / USDS 0.01% | uniswap-v4-ethereum | 0xb54e...9180 | 1.00180091791303 |
| DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 0.997437216833605 |
| USDC / USDS 0.001% | maverick-v2-eth | 0xdf9c...8878 | 1.00331850683919 |
| DAI / USDS 0.001% | maverick-v2-eth | 0x8f42...2b1f | 1.00324793947763 |
| USDT / USDC / GHO / DAI / USDe / USDS / PYUSD / RLUSD | curve | 0xef3a...e419 | 0.9902554378 |
| USDC / USDS 0.05% | uniswap_v3 | 0x8aee...6464 | 0.99945463440658 |
| Mog / USDS 0.01% | uniswap_v3 | 0x850e...44a0 | 0.997500311900072 |
| USDR / USDS 0.05% | uniswap-v4-ethereum | 0x8891...4d05 | 0.996476618373295 |
| USDC / USDS 0.01% | uniswap-v4-ethereum | 0xcecc...e9f8 | 0.999593568731415 |
| USDS / DFiUSD 0.01% | uniswap-v4-ethereum | 0x2325...7908 | 1.0004571136 |
| USDS / DEXT 1% | uniswap_v3 | 0xe257...b9a4 | 1.002739399 |
| USDS / ETH 1% | uniswap-v4-ethereum | 0xefd3...c5e5 | 0.71568106 |
| ESPN / USDS 0.05% | uniswap_v3 | 0x6007...b01e | 0.997187032644631 |
| USDT / USDS | uniswap-v4-ethereum | 0x7716...4d5f | 0.9997266927 |
| USDC / USDS 0.008% | uniswap-v4-ethereum | 0x09d6...c4ed | 1.0010898556 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.