| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| stETH / frxETH | curve | 0x4d9f...831e | 3074.8336835766898580510550617430923849823365738303246920440055488 |
| alETH / frxETH | curve | 0xb657...587d | 3118.84230377384 |
| frxETH / WETH | curve | 0x9c3b...31bc | 3075.1831931981574791987042234038987869941955977677171385851651505 |
| frxETH / ETH | curve | 0xa1f8...e577 | 3076.0555920990773078273125136183011507600144518706745528403136318 |
| frxETH / CVX | curve | 0x47d5...5093 | 3072.15764615904 |
| frxETH / FRAX 1% | uniswap_v3 | 0x36c0...3f56 | 3069.12299531255 |
| uniETH / frxETH | curve | 0x78c5...1733 | 3068.12713977874 |
| msETH / frxETH | curve | 0x2d60...1b9a | 3068.04414158899 |
| FXS / frxETH | fraxswap_ethereum | 0x49fd...e9f1 | 3093.80278701953 |
| rETH / frxETH | curve | 0xe7c6...74d9 | 3146.078746103886656809416920000258960347825529396951898858615405 |
| frxETH / IQ | curve | 0xa795...55cb | 3058.68337704381 |
| frxETH / WETH | solidlydex | 0x4e30...9c96 | 3092.96494844667 |
| crvUSD / frxETH / Silo | curve | 0x86bf...a1d3 | 3073.2374365727251410736294665861081425088197772517999524623734206 |
| swETH / frxETH | curve | 0x67e0...b767 | 3093.84609579047 |
| frxETH / ETH 0.3% | uniswap-v4-ethereum | 0xb156...1294 | 3124.46456232998 |
| frxETH / OETH | curve | 0xfa0b...8949 | 3093.2495874829090913863838163834931652840569964661564509797644237 |
| RZR / frxETH / scrvUSD | curve | 0xc2fc...8bd3 | 3195.6089254386977133739932185830989412562399518333462593510956307 |
| aETHc / frxETH | curve | 0x41ea...f559 | 3110.92215457161 |
| WACME / frxETH | curve | 0x7bbe...7fa3 | 3120.86672684212 |
| pxETH / frxETH / pxETH/frxETH 0.04% | balancer_ethereum | 0xb06b...f148 | 3107.67180825211 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.