| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSDS / USDT | curve | 0x0083...fd10 | 0.8544448138 |
| frxUSD / sUSDS | curve | 0x81a2...c4b7 | 0.852389810105833 |
| scrvUSD / sUSDS | curve | 0xfd16...e5e1 | 0.846894340200424 |
| sUSDe / sUSDS 0.01% | uniswap_v3 | 0xd858...886f | 0.864630442919117 |
| XAUt / sUSDS 1% | uniswap-v4-ethereum | 0x2f5d...76ff | 0.863183691033081 |
| DOLA / sUSDS | curve | 0x8b83...f710 | 0.853736775961843 |
| hOHM / sUSDS 1% | uniswap_v3 | 0xd80e...ffd9 | 0.863745243966684 |
| sUSDe / sUSDS | curve | 0x3cef...bb79 | 0.849743667189331 |
| USD3 / sUSDS | curve | 0x65b0...1609 | 0.84361501354183 |
| OHM / sUSDS 0.3% | uniswap_v3 | 0x0858...a755 | 0.863745243966684 |
| xpUSD / sUSDS | curve | 0xbdca...d4b3 | 0.843051094788181 |
| waEthUSDT / sUSDS / waEthUSDC | balancer-v3-ethereum | 0x147c...3ca4 | 0.865004920284883 |
| NUTS / sUSDS 0.3% | uniswap-v4-ethereum | 0x44fa...77c5 | 0.866800103856664 |
| wstETH / sUSDS | carbon-defi-ethereum | 0xc537...2129 | 0.862462618546424 |
| XAUt / sUSDS | carbon-defi-ethereum | 0xc537...2236 | 0.862713772483101 |
| SKY / LDO / sUSDS / ixEdel / svZCHF 0.02% | balancer-v3-ethereum | 0xd10d...c8fe | 0.07680578527 |
| GYD / sUSDS 0.01% | balancer_ethereum | 0xc839...080a | 1.0837374857 |
| USD0 / sUSDS 0.05% | uniswap_v3 | 0xb4f2...3d68 | 189975425926008000000000.0 |
| ETH / sUSDS 0.3% | uniswap-v4-ethereum | 0x51cc...8bcf | 0.839171039851357 |
| litUSD / sUSDS | curve | 0xe8cf...de2c | 0.81727737307108374709367828120616065234453118709944630119579838 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.