| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / WETH / CRV | curve | 0x4ebd...4a14 | 0.993839679024432 |
| crvUSD / USDC | curve | 0x4dec...d69e | 0.99312535598391 |
| crvUSD / USDT | curve | 0x390f...7bf4 | 0.992798965358657 |
| crvUSD / WBTC | curve | 0xd9ff...8373 | 1.0042437992928861978308602250033914867337034448493688290655528726 |
| crvUSD / tBTC | curve | 0xf1f4...6127 | 0.99317676548066140641223644339015231554703381293445937915415538 |
| frxUSD / crvUSD | curve | 0x13e1...43e1 | 1.0005120601881099606939213023928273056987154611300887526576970448 |
| PYUSD / crvUSD | curve | 0x625e...6200 | 1.0015524886198 |
| crvUSD / YB | curve | 0xec97...d65b | 1.0011468798751901239851061810426842310170440928440824356460307395 |
| crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 1.00156359420625 |
| GHO / crvUSD | curve | 0x635e...8595 | 0.999807091853493 |
| crvUSD / sUSDe | curve | 0x5706...2e85 | 0.997472054698481 |
| USDe / crvUSD | curve | 0xf55b...0442 | 0.993800404516597 |
| crvUSD / FRAX | curve | 0x0cd6...e538 | 0.994712636214259 |
| crvUSD / ZCHF | curve | 0x027b...2ca9 | 0.994605812327304 |
| crvUSD / CJPY | curve | 0xca54...e5b0 | 1.0005479502003625672380656334229756487935343345693585283398304435 |
| crvUSD / HEMI | curve | 0x3bfa...5790 | 0.995402079922175 |
| cUSD / crvUSD | curve | 0x2d1e...5b09 | 0.997458291103711 |
| crvUSD / VUSD | curve | 0xb1c1...944f | 0.9992181438232611737474299462538634324697345651619770763721172165 |
| crvUSD / PROS | curve | 0x440f...8b34 | 0.9932121880176671285292179248328520778704474880078257505843403995 |
| crvUSD / sUSD | curve | 0x94cc...0b41 | 1.001761367182136131587120176088009147932696518515615232518352594 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.