| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FXS / FRAX | fraxswap_ethereum | 0x03b5...36fa | 0.789203287586078 |
| WFRAX / FXS 0.01% | uniswap-v4-ethereum | 0x5e15...df01 | 0.791844304110596 |
| FXS / WETH 1% | uniswap_v3 | 0xcd82...9fbf | 0.795208694502957 |
| WFRAX / FXS | curve | 0x54e4...6d9a | 0.794758584750870251210422711102055156151597381436537705850748483 |
| FXS / frxETH | fraxswap_ethereum | 0x49fd...e9f1 | 0.786036167070299 |
| FXS / FRAX | uniswap_v2 | 0xe157...d237 | 0.791011725178529 |
| FXS / FPI | fraxswap_ethereum | 0x3ecf...bf80 | 0.787240586713837 |
| FXS / cvxFXS | curve | 0x6a90...36d0 | 0.80247394898989 |
| FXS / WETH | uniswap_v2 | 0xecba...2e81 | 0.786233070690191 |
| FXS / WETH | curve | 0x941e...12fe | 0.82147508138707 |
| FXS / FPIS | fraxswap_ethereum | 0x7a9b...c38b | 0.805999853716612 |
| crvUSD / FXS | curve | 0xfb8b...4009 | 0.789101564822608295284053283037122230360024750188296910833980606 |
| pitchFXS / FXS | curve | 0x0ad6...6e24 | 0.823657638310137095384883140673292276272966780826002775787183325 |
| FXS / frxETH | solidlydex | 0x1ed3...bad4 | 0.81432832144514 |
| FXS / frxETH | curve | 0x5133...b82b | 0.813213015811824 |
| FXS / cvxFXS | curve | 0xd658...d94a | 0.781370059357623 |
| FXS / FRAX 1% | uniswap_v3 | 0xb645...107f | 0.814677263216066 |
| FXS / USDT 88% | uniswap-v4-ethereum | 0xe9d5...e620 | 0.827027632 |
| FXS / WETH 0.3% | uniswap_v3 | 0x39c9...35c5 | 3.4785239953 |
| FXS / sdFXS | curve | 0x71c9...8595 | 0.849141198359849 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.