| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSD / sUSDe | curve | 0x4b5e...ebae | 0.974030524188437 |
| sUSD / SNX 1% | uniswap_v3 | 0xa3cc...eb1e | 0.978842148319392 |
| sUSD / WETH | uniswap_v2 | 0xf807...4b5c | 0.980661908392123 |
| sUSD / WETH | sushiswap | 0xf1f8...5539 | 0.978023307441734 |
| crvUSD / sUSD | curve | 0x94cc...0b41 | 0.973401541328666 |
| sUSD / USDe | curve | 0x59a0...f95d | 0.987137417755117817043446057942053593437625351107557091865956444 |
| crvFRAX / sUSD | curve | 0xe3c1...f5ef | 0.968308706570822 |
| DHT / sUSD | uniswap_v2 | 0x303f...c33e | 0.978300296167325 |
| $AAPL / sUSD | uniswap_v2 | 0x16d4...ccaf | 0.969223489262948 |
| BASX / sUSD | uniswap_v2 | 0xcf69...d0da | 0.978037713578463 |
| $BASED / sUSD | uniswap_v2 | 0xaad2...ae57 | 0.979472373288196 |
| sil / sUSD | sushiswap | 0xf3e9...63a2 | 0.978230239292515 |
| sUSD / FRAX 0.05% | uniswap_v3 | 0x34ff...0b45 | 0.7749316299 |
| $BASED / sUSD | uniswap_v2 | 0x0f33...1bc3 | 0.983362782219744 |
| sUSD / USDC 0.05% | uniswap_v3 | 0x6a98...e5d5 | 0.976239832049165 |
| sUSD / WETH 0.3% | uniswap_v3 | 0x6e2a...6f5f | 1.0276857787 |
| sUSD / DAI 0.3% | uniswap_v3 | 0xba6f...131e | 0.978676075 |
| snxUSD / sUSD / wUSDA | curve | 0x5ec5...86b7 | 0.9590732367 |
| wUSDA / snxUSD / sUSD | curve | 0x9847...f7e4 | 0.9462362141 |
| sUSD / DAI 0.05% | uniswap_v3 | 0xdd96...c57c | 0.9783798414 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.