| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PYUSD / USDS | curve | 0xa632...fc1f | 0.993043547873795 |
| USDT / USDS | uniswap-v4-ethereum | 0x3b1b...d5b9 | 0.998423954951177 |
| USDS / stUSDS | curve | 0x2c7c...78ae | 0.9929361991 |
| USDS / SKY | uniswap_v2 | 0x2621...9e3c | 0.9983891031 |
| PYUSD / USDS | uniswap-v4-ethereum | 0xe63e...5d45 | 1.00119818084575 |
| SKY / USDS 0.05% | uniswap-v4-ethereum | 0x2d04...7460 | 0.999687222332802 |
| DAI / USDS 0.3% | uniswap_v3 | 0xe9f1...6c67 | 0.996579871471935 |
| USDT / USDS 0.01% | uniswap-v4-ethereum | 0xb54e...9180 | 1.0000679613164 |
| USDC / USDS 0.001% | maverick-v2-eth | 0xdf9c...8878 | 0.997973615990682 |
| USDS / ETH 0.05% | uniswap-v4-ethereum | 0x08df...4e3e | 1.0012107992 |
| DAI / USDS 0.001% | maverick-v2-eth | 0x8f42...2b1f | 1.00330047061796 |
| USDT / USDC / GHO / DAI / USDe / USDS / PYUSD / RLUSD | curve | 0xef3a...e419 | 0.9898808288 |
| ESPN / USDS 0.05% | uniswap_v3 | 0x6007...b01e | 0.997112548011486 |
| USDT / USDS 0.01% | uniswap_v3 | 0x31e2...1d1e | 1.00319048582263 |
| PEPE / USDS 0.01% | uniswap_v3 | 0x05b5...3fe6 | 0.997147586132014 |
| Mog / USDS 0.01% | uniswap_v3 | 0x850e...44a0 | 0.997232624136641 |
| USDC / USDS 0.3% | uniswap_v3 | 0xa66a...6146 | 0.991587546733116 |
| USDR / USDS 0.05% | uniswap-v4-ethereum | 0x8891...4d05 | 1.0004390085757 |
| USDC / USDS 0.01% | uniswap-v4-ethereum | 0xcecc...e9f8 | 0.9995935687 |
| USDS / DFiUSD 0.01% | uniswap-v4-ethereum | 0x2325...7908 | 0.998116898 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.