| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDf / USDT 0.01% | uniswap_v3 | 0xc275...fa83 | 0.996192877261694 |
| USDC / USDf | curve | 0x7231...a976 | 0.992020633473806 |
| frxUSD / USDf | curve | 0x98e9...b5e6 | 0.991017342405817 |
| waEthLidoGHO / USDf 0.01% | balancer-v3-ethereum | 0x6c59...59ed | 1.01330490691816 |
| USD1 / USDf 0.01% | uniswap_v3 | 0xb0f1...e89b | 0.995698824762214 |
| USDT / USDf 0.01% | pancakeswap-v3-ethereum | 0x0d9e...1e77 | 1.00223481067326 |
| USDC / USDf 0.01% | uniswap_v3 | 0x919b...51ca | 0.99871983141487 |
| USDC / USDf | pancakeswap_ethereum | 0xac36...3a05 | 0.999378541361655 |
| USDT / USDf | bunni-ethereum | 0x6830...60a3 | 0.9971876407 |
| FF / USDf 0.3% | uniswap_v3 | 0x0204...adcb | 1.0001909397 |
| sUSDf / USDf 1% | uniswap-v4-ethereum | 0x1485...5f1c | 1.0001297635 |
| USDT / USDf 88% | uniswap-v4-ethereum | 0xdabc...988a | 8.3280729755 |
| USDT / USDf | pancakeswap_ethereum | 0xe0b7...020b | 0.996405734480382 |
| USDC / USDf 0.1% | uniswap-v4-ethereum | 0x465f...a6ba | 1.0084147504 |
| USDT / USDf 0.01% | uniswap-v4-ethereum | 0x98d5...2e08 | 1.0011878491 |
| USDf / WETH 0.3% | uniswap_v3 | 0x918e...0b84 | 0.9918114081 |
| USDf / WETH 0.01% | uniswap_v3 | 0x1ea2...b718 | 1.0236884862 |
| USDT / USDf 0.05% | uniswap_v3 | 0x90d7...e918 | 0.9982326908 |
| USDT / USDf | uniswap_v2 | 0x9f4e...059d | 1.0076154943 |
| USDC / USDf 0.01% | uniswap-v4-ethereum | 0x96f2...b8e8 | 1.0015986359 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.