| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSDe / USDT | fluid-ethereum | 0x1dd1...fa9b | 1.20251924691854 |
| sUSDe / USDT 0.01% | uniswap_v3 | 0x7eb5...4ccc | 1.20387594937237 |
| GHO / sUSDe | fluid-ethereum | 0xdd5f...6be3 | 1.20246580804244 |
| DOLA / sUSDe | curve | 0x7447...92ef | 1.1942774010722 |
| sDAI / sUSDe | curve | 0x1674...8d3a | 1.19822997943341 |
| sUSD / sUSDe | curve | 0x4b5e...ebae | 1.19729699396881 |
| sUSDe / USDT 0.005% | uniswap-v4-ethereum | 0xabf2...1257 | 1.20228701539611 |
| sUSDe / USDT 0.02% | uniswap-v4-ethereum | 0xb187...d096 | 1.21240716640542 |
| sUSDe / sUSDS | curve | 0x3cef...bb79 | 1.19582857971911 |
| scrvUSD / sUSDe | curve | 0xd29f...c1b1 | 1.19730155172948 |
| reUSD / sUSDe | curve | 0x5c2a...2972 | 1.2002599566164929756637443865060834648372002602028837668986106244 |
| crvUSD / sUSDe | curve | 0x5706...2e85 | 1.19126073551041 |
| reUSDe / sUSDe | curve | 0x43b9...3734 | 1.19498722410609 |
| MUSD / sUSDe | curve | 0x765c...285e | 1.20574132090344 |
| USD3 / sUSDe | curve | 0x9645...9688 | 1.20560589315606 |
| siUSD / sUSDe 0.01% | balancer-v3-ethereum | 0x0718...6867 | 1.21595866459446 |
| sUSDe / USDT 0.05% | uniswap_v3 | 0x867b...422e | 1.21082868342272 |
| sUSDe / USDT 0.03% | uniswap-v4-ethereum | 0x3271...237b | 1.21223754351832 |
| sUSDe / USDC | uniswap_v2 | 0x2289...278a | 1.20469379898351 |
| sUSDe / ETH 0.3% | uniswap-v4-ethereum | 0x7663...8a72 | 1.19006812537704 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.