| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| FPI / FRAX | curve | 0x2cf9...f3fe | 1.13816537233142 |
| FXS / FPI | fraxswap_ethereum | 0x3ecf...bf80 | 1.11984849724671 |
| FPI / FRAX 0.3% | uniswap_v3 | 0xd2a9...2797 | 1.13776621808823 |
| FPI / FRAX | curve | 0xf861...d37c | 1.12957263218065 |
| SPOT / FPI | curve | 0xa3b7...faf5 | 1.11909458123794 |
| FPI / FRAX | fraxswap_ethereum | 0xd798...782b | 1.12365756391416423574987848356254506094542734097202105476514286977915564709956687708339642349425212522316954281166129335 |
| FPI / FRAX | fraxswap_ethereum | 0x5a1e...82bb | 1.06720186931626931005387481418158963159647393634002486469912743779854222017517113115587256475488659357376 |
| FXS / FPI | fraxswap_ethereum | 0x843b...6c65 | 1.1440549939 |
| FPI / WETH 1% | uniswap_v3 | 0xdb44...f0b5 | 1.015571424591337937165240704940737816096604443178596368192 |
| VOLT / FPI 0.05% | uniswap_v3 | 0x2ded...7266 | 1.13631674348524657840889702652566009735552032 |
| FPI / FPIS 1% | uniswap_v3 | 0xe7c6...ac8e | 0.856674376532934494296593170112 |
| FPI / FPIS | fraxswap_ethereum | 0xd354...e92f | 1.13886016638334 |
| FPI / FRAX 0.05% | uniswap_v3 | 0xc83b...303d | 1.08546068292726322884622240454428605505634048 |
| FPI / FRAX 1% | uniswap_v3 | 0xe2cf...b31c | 1.13493681674725114309784021420277736693673088 |
| FPI / WETH 0.05% | uniswap_v3 | 0x4f6d...243a | 1.30987403071901 |
| FPI / WETH 0.3% | uniswap_v3 | 0xbd18...19de | 1.07818692694704 |
| FPI / LUSD 0.05% | uniswap_v3 | 0xae40...9028 | 1.08238664719777323699896367622 |
| FPI / MAC 1% | uniswap_v3 | 0xedfd...d31e | 1.028320599064043734221388701789341624232252 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.