| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| stETH / frxETH | curve | 0x4d9f...831e | 2293.6158009102 |
| frxETH / WETH | curve | 0x9c3b...31bc | 2294.2398283139 |
| frxETH / ETH | curve | 0xa1f8...e577 | 2289.2609585826 |
| alETH / frxETH | curve | 0xb657...587d | 2305.81273067365 |
| rETH / frxETH | curve | 0xe7c6...74d9 | 2296.7501906412 |
| uniETH / frxETH | curve | 0x78c5...1733 | 2288.42432778239 |
| frxETH / CVX | curve | 0x47d5...5093 | 2289.0179928716 |
| frxETH / FRAX 1% | uniswap_v3 | 0x36c0...3f56 | 2315.7570212318 |
| msETH / frxETH | curve | 0x2d60...1b9a | 2306.17742330345 |
| frxETH / WETH | solidlydex | 0x4e30...9c96 | 2313.8586989771 |
| FXS / frxETH | fraxswap_ethereum | 0x49fd...e9f1 | 2303.94555289109 |
| swETH / frxETH | curve | 0x67e0...b767 | 2285.96206164521 |
| frxETH / IQ | curve | 0xa795...55cb | 2268.9779346785 |
| crvUSD / frxETH / Silo | curve | 0x86bf...a1d3 | 2279.29905871496 |
| pxETH / frxETH / pxETH/frxETH 0.04% | balancer_ethereum | 0xb06b...f148 | 2295.06851764283 |
| CRV / frxETH | curve | 0x442f...fe4a | 2290.93194609255 |
| tBTC / FRAX / frxETH | curve | 0x4d19...825b | 74378.9702540318 |
| crvUSD / frxETH / SDT | curve | 0x9543...7847 | 2276.3547417365266401297611522515202666964681894394145715331629513 |
| pxETH / frxETH | curve | 0xe2ed...d987 | 2277.02656145921 |
| frxETH / WETH 0.05% | pancakeswap-v3-ethereum | 0x5c9c...b1b0 | 2295.5605372132 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.