| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSD / sUSDe | curve | 0x4b5e...ebae | 0.5530966416 |
| sUSD / SNX 1% | uniswap_v3 | 0xa3cc...eb1e | 0.553572105 |
| sUSD / WETH | uniswap_v2 | 0xf807...4b5c | 0.5538994075 |
| sUSD / WETH | sushiswap | 0xf1f8...5539 | 0.5557384352 |
| sUSD / USDC 0.3% | uniswap-v4-ethereum | 0xa306...c6a8 | 0.5528672211 |
| DHT / sUSD | uniswap_v2 | 0x303f...c33e | 0.555042930985966 |
| crvUSD / sUSD | curve | 0x94cc...0b41 | 0.564823293633722 |
| sUSD / USDC 0.01% | uniswap-v4-ethereum | 0x3d7a...04b2 | 0.5595501579 |
| $AAPL / sUSD | uniswap_v2 | 0x16d4...ccaf | 0.558063020194704 |
| sil / sUSD | sushiswap | 0xf3e9...63a2 | 0.558261476237919 |
| crvFRAX / sUSD | curve | 0xe3c1...f5ef | 0.554603062666907 |
| $BASED / sUSD | uniswap_v2 | 0xaad2...ae57 | 0.568395326129587 |
| BASX / sUSD | uniswap_v2 | 0xcf69...d0da | 0.553328067555295 |
| $BASED / sUSD | uniswap_v2 | 0x0f33...1bc3 | 0.58716613797033 |
| sUSD / DAI 0.3% | uniswap_v3 | 0xba6f...131e | 0.5549234537 |
| sUSD / USDe | curve | 0x59a0...f95d | 0.58417136 |
| SESH / sUSD / FLIP 0.3% | balancer_ethereum | 0x0361...d5d2 | 0.585722677348392 |
| $BASED / sUSD | sushiswap | 0x3e5e...93af | 0.581402649203114 |
| YUNO / sUSD | uniswap_v2 | 0x03b2...25d6 | 0.553333747879494 |
| sUSD / USDC 1% | uniswap-v4-ethereum | 0xd293...c0df | 0.7307944391 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.