Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DAI / USDC / USDT / sUSD | curve | 0xa540...fbfd | 0.996192315823264 |
sUSD / sUSDe | curve | 0x4b5e...ebae | 0.991585394516028 |
sUSD / USDe | curve | 0x59a0...f95d | 0.992500709773973 |
sUSD / SNX 1% | uniswap_v3 | 0xa3cc...eb1e | 0.990535154826102 |
sUSD / WETH | sushiswap | 0xf1f8...5539 | 0.995846618214365 |
sUSD / WETH | uniswap_v2 | 0xf807...4b5c | 0.996508399792401 |
crvUSD / sUSD | curve | 0x94cc...0b41 | 0.993503415535382 |
DHT / sUSD | uniswap_v2 | 0x303f...c33e | 0.99245246382992 |
crvFRAX / sUSD | curve | 0xe3c1...f5ef | 0.996349120773325 |
sUSD / DAI 0.3% | uniswap_v3 | 0xba6f...131e | 0.990469118366503 |
sUSD / xSUSHI | sushiswap | 0x28b3...88ce | 0.996748843517615 |
sUSD / snxUSD | curve | 0x1586...dad7 | 0.994301373779114 |
BASX / sUSD | uniswap_v2 | 0xcf69...d0da | 0.9627800077 |
sil / sUSD | sushiswap | 0xf3e9...63a2 | 0.990740706978108 |
$BASED / sUSD | uniswap_v2 | 0xaad2...ae57 | 0.992222340484864 |
$AAPL / sUSD | uniswap_v2 | 0x16d4...ccaf | 0.992291701195264 |
sUSD / FRAX 0.05% | uniswap_v3 | 0x34ff...0b45 | 0.995138163805952 |
$BASED / sUSD | uniswap_v2 | 0x0f33...1bc3 | 0.992222340484864 |
sUSD / USDC 0.05% | uniswap_v3 | 0x6a98...e5d5 | 0.999911735068918 |
sUSD / WETH 0.3% | uniswap_v3 | 0x6e2a...6f5f | 0.93356997 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.