| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / cbBTC | curve | 0x83f2...eb32 | 0.950528242901633 |
| PYUSD / crvUSD | curve | 0x625e...6200 | 0.963657527242813 |
| crvUSD / USDC | curve | 0x4dec...d69e | 0.993543635267463 |
| crvUSD / WBTC | curve | 0xd9ff...8373 | 0.9876229442535 |
| crvUSD / tBTC | curve | 0xf1f4...6127 | 0.950912326958488 |
| crvUSD / USDT | curve | 0x390f...7bf4 | 0.990680871360359 |
| crvUSD / WETH | curve | 0x6e54...a9c2 | 0.995241383618296 |
| frxUSD / crvUSD | curve | 0x13e1...43e1 | 0.963058728662534 |
| pmUSD / crvUSD | curve | 0xecb0...c2cb | 0.963560473903348 |
| crvUSD / WETH / CRV | curve | 0x4ebd...4a14 | 0.993275898657326 |
| GHO / crvUSD | curve | 0x635e...8595 | 0.963492564943711 |
| crvUSD / YB | curve | 0xec97...d65b | 0.962742379995171 |
| crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.99806424608238221384333370629622929133520162554378899916739325 |
| crvUSD / sUSDe | curve | 0x5706...2e85 | 0.953223701350737 |
| USDe / crvUSD | curve | 0xf55b...0442 | 0.962979316544809 |
| crvUSD / ZCHF | curve | 0x027b...2ca9 | 0.963526288440781 |
| OUSD / crvUSD | curve | 0xefa9...f3ec | 0.963325150658518 |
| USDC / crvUSD 0.01% | ekubo-v3-ethereum | 0x0000...29bd | 1.00137307950537 |
| USDP / crvUSD | curve | 0xca97...53d0 | 0.95621277740899254062794959295303042055044048346521769825608368 |
| crvUSD / FRAX | curve | 0x0cd6...e538 | 0.99586749050958 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.