| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / USDC | curve | 0x4dec...d69e | 0.988631519 |
| crvUSD / cbBTC | curve | 0x83f2...eb32 | 0.9512664188 |
| PYUSD / crvUSD | curve | 0x625e...6200 | 0.960408617483521 |
| crvUSD / WBTC | curve | 0xd9ff...8373 | 0.990580342 |
| crvUSD / tBTC | curve | 0xf1f4...6127 | 0.9512664188 |
| crvUSD / USDT | curve | 0x390f...7bf4 | 1.0058973946 |
| GHO / crvUSD | curve | 0x635e...8595 | 0.971528709782074614365965277076430545756091946678575750569460071 |
| crvUSD / WETH | curve | 0x6e54...a9c2 | 1.0144780733 |
| frxUSD / crvUSD | curve | 0x13e1...43e1 | 0.973351943677296499102970047623803512717521310824632402410027377 |
| pmUSD / crvUSD | curve | 0xecb0...c2cb | 0.983542335445522 |
| crvUSD / WETH / CRV | curve | 0x4ebd...4a14 | 0.9604086175 |
| crvUSD / sUSDe | curve | 0x5706...2e85 | 0.9976344699 |
| USDe / crvUSD | curve | 0xf55b...0442 | 0.9976344698995799923979536573435281276776802339794671449473258829 |
| crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.9991914127 |
| crvUSD / YB | curve | 0xec97...d65b | 0.9604850039 |
| crvUSD / ZCHF | curve | 0x027b...2ca9 | 0.9596598936 |
| OUSD / crvUSD | curve | 0xefa9...f3ec | 0.960485003931046 |
| crvUSD / FRAX | curve | 0x0cd6...e538 | 0.9846011235 |
| USDC / crvUSD 0.01% | ekubo-v3-ethereum | 0x0000...29bd | 0.999664327880844 |
| crvUSD / CJPY | curve | 0xca54...e5b0 | 0.9581921769 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.