Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USDS / SKY | uniswap_v2 | 0x2621...9e3c | 1.00156558484437 |
USDC / USDS 0.3% | uniswap_v3 | 0xa66a...6146 | 0.996219337339983 |
IMF / USDS 0.01% | uniswap_v3 | 0x2988...0c1a | 0.997236286593536 |
DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 0.993410343062681 |
USDC / USDS 0.001% | maverick-v2-eth | 0xdf9c...8878 | 0.998572121630822 |
DAI / USDS 0.001% | maverick-v2-eth | 0x8f42...2b1f | 1.00147035004855 |
JOE / USDS 0.01% | uniswap_v3 | 0x588d...f759 | 0.998253356054327 |
Mog / USDS 0.01% | uniswap_v3 | 0x850e...44a0 | 0.998637040400841 |
PEPE / USDS 0.01% | uniswap_v3 | 0x05b5...3fe6 | 0.997236286593536 |
USDS / SPX 0.01% | uniswap_v3 | 0x2541...f387 | 1.00324988618456 |
DAI / USDS 0.3% | uniswap-v4-ethereum | 0x18a9...e5d9 | 0.9991745932 |
USDS / WBTC 0.3% | uniswap-v4-ethereum | 0x2bf0...a68d | 0.9964668551 |
PAXG / USDS 0.3% | uniswap-v4-ethereum | 0xd3b4...b591 | 0.9944195173 |
TEST / USDS 0.3% | uniswap_v3 | 0xecfb...fea7 | 0.9930194487 |
USDS / ETH 0.3% | uniswap-v4-ethereum | 0x4fa8...62b7 | 1.0059521601 |
DAI / USDS 0.2% | uniswap-v4-ethereum | 0x4903...d449 | 1.0021052932 |
USDC / USDS 0.01% | uniswap-v4-ethereum | 0x4733...8017 | 1.0011718174 |
USDC / USDS 0.05% | uniswap-v4-ethereum | 0x665e...d01d | 0.9944100793 |
USDT / USDS 0.05% | uniswap-v4-ethereum | 0x91d8...70f9 | 0.9877364317 |
USDC / USDS 0.004% | uniswap-v4-ethereum | 0xea40...785c | 1.0006182803 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.