Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
reUSD / scrvUSD | curve | 0xc522...4f50 | 1.03492141827801 |
scrvUSD / sUSDe | curve | 0xd29f...c1b1 | 1.04691455652835 |
scrvUSD / sUSDS | curve | 0xfd16...e5e1 | 1.04503095578997 |
sDOLA / scrvUSD | curve | 0x76a9...6637 | 1.03492141827801 |
DOLA / scrvUSD | curve | 0xff17...8b3c | 1.04753682192834 |
sfrxUSD / scrvUSD | curve | 0x15e4...5752 | 1.05934829003175 |
USD3 / scrvUSD | curve | 0xe998...2d1e | 1.05252812713254 |
stUSD / scrvUSD / BOND | curve | 0xbe99...708e | 1.04769480536861 |
frxUSD / scrvUSD | curve | 0x4d96...e5f3 | 1.05684496929428 |
crvUSD / QUINTA / GTEC / GRD / iBBT / REAL / USDe / scrvUSD | curve | 0x7b70...f464 | 0.9959171652 |
PT-scrvUSD@16/9/2025 / scrvUSD | curve | 0xb310...ebc7 | 1.045982771 |
scrvUSD / sdeUSD | curve | 0x7fd0...644f | 1.0751831437414 |
sDAI / scrvUSD / BOND | curve | 0xab19...3c5f | 1.0392588289 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.