| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| MUSD / USDC 0.01% | uniswap-v4-ethereum | 0xa9bf...83a0 | 0.993761444978014 |
| USDC / MUSD 0.01% | uniswap_v3 | 0x748c...b945 | 0.991202025938499 |
| MUSD / crv2pool | curve | 0xb557...955f | 0.993959123504884 |
| tBTC / MUSD 0.05% | uniswap-v4-ethereum | 0x0dd1...8183 | 0.993197675452188 |
| MUSD / sUSDe | curve | 0x765c...285e | 0.987443923802658 |
| MUSD / crvUSD 0.01% | uniswap_v3 | 0x3908...e821 | 0.990375462197275 |
| MUSD / ETH 0.05% | uniswap-v4-ethereum | 0x8cc1...71db | 0.9922997932 |
| USDT / MUSD 0.001% | uniswap-v4-ethereum | 0x0464...a538 | 0.9915689105 |
| USDC / MUSD 0.001% | uniswap-v4-ethereum | 0x0b3b...1a0e | 0.997732414 |
| MUSD / sUSDe | curve | 0x7c06...b337 | 1.000237859 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.