Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
sDAI / sUSDe | curve | 0x1674...8d3a | 1.16456915956827 |
sUSDe / USDT 0.01% | uniswap_v3 | 0x7eb5...4ccc | 1.16032745070866 |
sUSDe / sUSDS | curve | 0x3cef...bb79 | 1.16772173024846 |
sUSDe / USDC 0.03% | uniswap-v4-ethereum | 0x47c0...f185 | 1.16661238943456 |
scrvUSD / sUSDe | curve | 0xd29f...c1b1 | 1.15405784549476 |
sUSDe / USDT 0.03% | uniswap-v4-ethereum | 0x3271...237b | 1.1620478075078 |
sUSDe / USDC 0.03% | uniswap-v4-ethereum | 0xbe32...b97e | 1.16662674360243 |
DOLA / sUSDe | curve | 0x7447...92ef | 1.15815942788367 |
sUSD / sUSDe | curve | 0x4b5e...ebae | 1.16514453199456 |
crvUSD / sUSDe | curve | 0x5706...2e85 | 1.1552401599723 |
sUSDe / USDC / sUSDe/USDC 0.2% | balancer_ethereum | 0xb819...179e | 1.16394450386085 |
sfrxUSD / sUSDe | curve | 0x3bd1...d6e2 | 1.15712846250634 |
sUSDe / GYD 0.05% | balancer_ethereum | 0x8d93...ee91 | 1.12614832802028 |
reUSDe / sUSDe | curve | 0x43b9...3734 | 1.16442324706661 |
sUSDe / USDC 0.05% | uniswap_v3 | 0x4e0f...eab8 | 1.16475566116387 |
sUSDe / USDT 0.05% | uniswap_v3 | 0x867b...422e | 1.17338335531641 |
USDC / sUSDe 0.02% | uniswap-v4-ethereum | 0x9564...6fd5 | 1.16251753865908 |
sUSDe / USDT 0.01% | uniswap-v4-ethereum | 0x93d5...4902 | 1.16156464731913 |
sUSDe / USDC | uniswap_v2 | 0x2289...278a | 1.16202780892677 |
wstETH / sUSDe 0.3% | balancer_ethereum | 0xa821...5e43 | 1.15582397486595 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.