Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ETH+ / eUSD / RSR | curve | 0xdb69...44b4 | 1649.42353722846 |
ETH+ / WETH 0.05% | uniswap_v3 | 0xf649...a348 | 1650.04813391547 |
ETH+ / WETH | curve | 0x7fb5...364b | 1641.01919990682 |
dgnETH / ETH+ | curve | 0x5ba5...3b4f | 1706.96268743594 |
USDC+ / ETH+ / SDT | curve | 0x1830...9c78 | 1627.0248706434 |
ETH+ / pxETH | curve | 0xaec7...25ed | 3728.15106694641 |
dgnETH / ETH+ | curve | 0x021c...72c7 | 2579.2955751352 |
USD3 / ETH+ | curve | 0x06a2...536e | 2442.4535007463 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.