| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSDe / USDT 0.008% | uniswap-v4-ethereum | 0xb203...448b | 1.2264540506 |
| sUSDe / USDT 0.025% | uniswap-v4-ethereum | 0xeac1...ffb8 | 1.22355442 |
| sUSDe / USDT 0.01% | uniswap_v3 | 0x7eb5...4ccc | 1.2238378397 |
| sUSDe / USDT | fluid-ethereum | 0x1dd1...fa9b | 1.2251930021 |
| sDAI / sUSDe | curve | 0x1674...8d3a | 1.20569520091509 |
| GHO / sUSDe | fluid-ethereum | 0xdd5f...6be3 | 1.22896026845598 |
| sUSDe / USDT 0.003% | uniswap-v4-ethereum | 0x2912...2182 | 1.2248519923 |
| DOLA / sUSDe | curve | 0x7447...92ef | 1.22079726155331 |
| sUSDe / sUSDS 0.007% | uniswap-v4-ethereum | 0xa142...7f65 | 1.1025481065 |
| scrvUSD / sUSDe | curve | 0xd29f...c1b1 | 1.11833805415574 |
| reUSD / sUSDe | curve | 0x5c2a...2972 | 1.2308533081961973670527366696689456760089468827545504071029878109 |
| crvUSD / sUSDe | curve | 0x5706...2e85 | 1.2266313399338817364340823272102059896168094414296467779566395331 |
| reUSDe / sUSDe | curve | 0x43b9...3734 | 1.22006447019568 |
| sUSD / sUSDe | curve | 0x4b5e...ebae | 1.21221168070456 |
| sUSDe / USDC 0.025% | supernova-cl | 0x648c...430e | 1.2273839792 |
| siUSD / sUSDe 0.01% | balancer-v3-ethereum | 0x0718...6867 | 1.2228858503458 |
| sUSDe / sUSDS | curve | 0x3cef...bb79 | 1.119905797 |
| USD3 / sUSDe | curve | 0x9645...9688 | 1.231574947358898400893377228077775372684634550977179934111588912 |
| sUSDe / USDC | uniswap_v2 | 0x2289...278a | 1.2288533935 |
| sUSDe / USDT 0.006% | uniswap-v4-ethereum | 0x4878...9d00 | 1.2330517916 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.