| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| msUSD / crvFRAX | curve | 0xc3b1...51dd | 0.998920535342475 |
| alUSD / crvFRAX | curve | 0xb30d...30a5 | 0.997873316747489 |
| ALCX / crvFRAX | curve | 0x4149...9d31 | 0.995841675850852 |
| eUSD / crvFRAX | curve | 0xaeda...4d4f | 1.00134146367549 |
| OHM / crvFRAX | curve | 0xfc1e...e48d | 1.00679180590156 |
| CVX / crvFRAX | curve | 0xbec5...b10d | 1.0015625016854034619808940612230054883846874041730583677364705232 |
| cvxCRV / crvFRAX | curve | 0x31c3...97a0 | 0.99482360505433 |
| BUSD / crvFRAX | curve | 0x8fdb...4190 | 0.999935985510802 |
| DOLA / crvFRAX | curve | 0xe571...884d | 1.00551142263509 |
| RSR / crvFRAX | curve | 0x6a62...60b2 | 1.00184488796092 |
| mkUSD / crvFRAX | curve | 0x0cfe...aee5 | 1.012175075516820809153936013326991385970515072530873410980410504 |
| crvFRAX / TUSD | curve | 0x33ba...e893 | 1.00027196967859 |
| GRAI / crvFRAX | curve | 0x3175...c0dc | 1.00480993938758 |
| STG / crvFRAX | curve | 0x867f...1ac8 | 1.00260430586456 |
| crvFRAX / sUSD | curve | 0xe3c1...f5ef | 1.00394821483287 |
| PUSd / crvFRAX | curve | 0xe609...7848 | 0.998248620441062 |
| GUSD / crvFRAX | curve | 0x4e43...8d93 | 0.996408988850399 |
| COIL / crvFRAX | curve | 0xaf42...df33 | 0.999490719707456 |
| ApeUSD / crvFRAX | curve | 0x04b7...077d | 1.0040477924 |
| clevUSD / crvFRAX | curve | 0x84c3...592c | 1.0060545714 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.