| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSDe / USDT | fluid-ethereum | 0x1dd1...fa9b | 1.20998483575088 |
| GHO / sUSDe | fluid-ethereum | 0xdd5f...6be3 | 1.21164680050187 |
| DOLA / sUSDe | curve | 0x7447...92ef | 1.20356896876528 |
| sUSDe / USDT 0.008% | uniswap-v4-ethereum | 0xb203...448b | 1.21101251179752 |
| sDAI / sUSDe | curve | 0x1674...8d3a | 1.2038581968051 |
| sUSDe / USDT 0.025% | uniswap-v4-ethereum | 0xeac1...ffb8 | 1.21101275570586 |
| sUSDe / sUSDS | curve | 0x3cef...bb79 | 1.2089696890749 |
| scrvUSD / sUSDe | curve | 0xd29f...c1b1 | 1.2021873305413 |
| crvUSD / sUSDe | curve | 0x5706...2e85 | 1.20327750171605 |
| sUSDe / USDT 0.01% | uniswap_v3 | 0x7eb5...4ccc | 1.21255875118441 |
| reUSD / sUSDe | curve | 0x5c2a...2972 | 1.20385629508186 |
| sUSDe / USDT 0.005% | uniswap-v4-ethereum | 0xabf2...1257 | 1.22044261638062 |
| sUSD / sUSDe | curve | 0x4b5e...ebae | 1.21108024865861 |
| sUSDe / USDT 0.015% | uniswap-v4-ethereum | 0xd9f7...b506 | 1.21134947371908 |
| reUSDe / sUSDe | curve | 0x43b9...3734 | 1.20486342518303 |
| USD3 / sUSDe | curve | 0x9645...9688 | 1.20422223157129 |
| MUSD / sUSDe | curve | 0x765c...285e | 1.20427521796634 |
| sUSDe / USDC | uniswap_v2 | 0x2289...278a | 1.212004163466 |
| EUROC / sUSDe | uniswap_v2 | 0xd141...fab1 | 1.21236021787118 |
| sUSDe / USDT 0.02% | uniswap-v4-ethereum | 0xb187...d096 | 1.21134015899039 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.