Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
frxETH / WETH | curve | 0x9c3b...31bc | 4362.71471425437 |
stETH / frxETH | curve | 0x4d9f...831e | 4361.20698225047 |
frxETH / ETH | curve | 0xa1f8...e577 | 4364.03069205878 |
alETH / frxETH | curve | 0xb657...587d | 4350.50984769448 |
frxETH / CVX | curve | 0x47d5...5093 | 4343.08795311181 |
frxETH / FRAX 1% | uniswap_v3 | 0x36c0...3f56 | 4430.15391678197 |
uniETH / frxETH | curve | 0x78c5...1733 | 4337.4856486408 |
frxETH / OETH | curve | 0xfa0b...8949 | 4357.41426002776 |
msETH / frxETH | curve | 0x2d60...1b9a | 4310.444283720312337334855440458313333765825495799602102090516995 |
FXS / frxETH | fraxswap_ethereum | 0x49fd...e9f1 | 4392.23567191036 |
swETH / frxETH | curve | 0x67e0...b767 | 4356.70546932117 |
frxETH / IQ | curve | 0xa795...55cb | 4294.37165950051989209724933434772217096971256685362969907057412 |
frxETH / WETH | solidlydex | 0x4e30...9c96 | 4349.86587575376 |
crvUSD / frxETH / Silo | curve | 0x86bf...a1d3 | 4322.88712700177 |
RZR / frxETH / scrvUSD | curve | 0xc2fc...8bd3 | 4338.13223205508 |
pxETH / frxETH / pxETH/frxETH 0.04% | balancer_ethereum | 0xb06b...f148 | 4332.69415967376 |
frxETH / ETH 0.3% | uniswap-v4-ethereum | 0xb156...1294 | 4333.35336756785 |
pxETH / frxETH | curve | 0xe2ed...d987 | 4363.877134553366462867138008583426640013515872078496766322456355 |
CRV / frxETH | curve | 0x442f...fe4a | 4359.62794553519 |
frxETH / WETH 0.05% | uniswap_v3 | 0x8a15...fdcb | 4571.95604756544 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.