| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PYUSD / USDS | curve | 0xa632...fc1f | 1.00164954951198 |
| USDS / stUSDS | curve | 0x2c7c...78ae | 0.998575157347244 |
| USDS / SKY | uniswap_v2 | 0x2621...9e3c | 1.00135279842118 |
| USDT / USDS 0.01% | uniswap-v4-ethereum | 0xb54e...9180 | 0.999007267577369 |
| USDC / USDS 0.01% | uniswap-v4-ethereum | 0xcecc...e9f8 | 1.00111362428977 |
| USDC / USDS 0.001% | maverick-v2-eth | 0xdf9c...8878 | 1.00073052814592 |
| DAI / USDS 0.001% | maverick-v2-eth | 0x8f42...2b1f | 0.997687603376145 |
| DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 1.00359686340027 |
| USDC / USDS 0.008% | uniswap-v4-ethereum | 0x09d6...c4ed | 1.00034204180199 |
| BOLD / USDS 0.05% | uniswap-v4-ethereum | 0x4bd8...c4e5 | 1.00522609929813 |
| USDC / USDS 0.05% | uniswap_v3 | 0x8aee...6464 | 0.999990402900272 |
| PEPE / USDS 0.01% | uniswap_v3 | 0x05b5...3fe6 | 1.00002565459515 |
| Mog / USDS 0.01% | uniswap_v3 | 0x850e...44a0 | 1.00215064386513 |
| ESPN / USDS 0.05% | uniswap_v3 | 0x6007...b01e | 1.02104542071663 |
| USDR / USDS 0.05% | uniswap-v4-ethereum | 0x8891...4d05 | 1.0066897168615 |
| USDS / DFiUSD 0.01% | uniswap-v4-ethereum | 0x2325...7908 | 1.00318262040678 |
| USDS / DEXT 1% | uniswap_v3 | 0xe257...b9a4 | 0.989808690990458 |
| USDS / ETH 1% | uniswap-v4-ethereum | 0xefd3...c5e5 | 0.7342282546 |
| USDT / USDS | uniswap-v4-ethereum | 0x7716...4d5f | 0.9997266927 |
| USDC / USDS 0.004% | uniswap-v4-ethereum | 0xea40...785c | 1.0006182803 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.