| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sUSDS / USDT | curve | 0x0083...fd10 | 1.071529017574551017439806838443070925036101377220001071034061552 |
| frxUSD / sUSDS | curve | 0x81a2...c4b7 | 1.06630886832151 |
| DOLA / sUSDS | curve | 0x8b83...f710 | 1.06488219250004 |
| OHM / sUSDS 0.3% | uniswap_v3 | 0x0858...a755 | 1.07628075477387 |
| sUSDe / sUSDS | curve | 0x3cef...bb79 | 1.06496902536137 |
| scrvUSD / sUSDS | curve | 0xfd16...e5e1 | 1.0655983976331 |
| stUSDS / sUSDS | curve | 0xb0ce...bca9 | 1.076837728515296096583589025069209823532405583248152524188661343 |
| hOHM / sUSDS 1% | uniswap_v3 | 0xd80e...ffd9 | 1.07509296918872 |
| ETH / sUSDS 0.3% | uniswap-v4-ethereum | 0x51cc...8bcf | 1.07784996272632 |
| NUTS / sUSDS 0.3% | uniswap-v4-ethereum | 0x44fa...77c5 | 1.07752596888957 |
| YB / sUSDS 0.3% | uniswap-v4-ethereum | 0xfdf7...103f | 1.07875761537197 |
| USD3 / sUSDS | curve | 0x65b0...1609 | 1.074072284299493575884973601791411293883719995344572189316432825 |
| USD0 / sUSDS 0.05% | uniswap_v3 | 0xb4f2...3d68 | 189975425926008000000000.0 |
| litUSD / sUSDS | curve | 0xe8cf...de2c | 1.084117895327224803987636668444693972987508052161935804796282027 |
| USD0 / sUSDS 0.01% | uniswap_v3 | 0xedaa...db5c | 68760720773714400000000.0 |
| sUSDe / sUSDS 0.015% | uniswap-v4-ethereum | 0xd42b...eb40 | 1.079938645631 |
| FLUID / sUSDS | carbon-defi-ethereum | 0xc537...2074 | 1.0778782361 |
| USDC / sUSDS 10% | uniswap-v4-ethereum | 0x4142...cda8 | 1.6918831042 |
| FRAX / sUSDS | curve | 0xd045...e779 | 1.06264326697934 |
| USDT / sUSDS | fluid-ethereum | 0xf507...f6bc | 1.0715407283 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.