| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 2831.5536642994 |
| sfrxETH / rsETH | curve | 0x3772...5810 | 2675.7238159091 |
| rsfrxETH / sfrxETH | curve | 0x7452...9e2f | 2814.54573888411 |
| sfrxETH / FRAX 2% | kyberswap_elastic | 0xd9ee...7a78 | 1969.968790553830544344000775410248381947708895705348 |
| InsfrxETH / sfrxETH | curve | 0x1506...1236 | 4295.0239953359 |
| sfrxETH / ETH 90% | uniswap-v4-ethereum | 0x836e...7a01 | 184.9242527752 |
| sfrxETH / USDT 99.914% | uniswap-v4-ethereum | 0xab36...9dc8 | 855.4834118048 |
| sfrxETH / USDC 96.19% | uniswap-v4-ethereum | 0xce8f...c34f | 1078.3031165751 |
| AsfrxETH / sfrxETH | curve | 0x76b0...57a0 | 2702.2207369876 |
| wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 0.3067858834 |
| sfrxETH / USDT 87% | uniswap-v4-ethereum | 0x362b...4ffd | 25615.7281844179 |
| sfrxETH / ICHI 1% | uniswap_v3 | 0xa19f...2542 | 710.562125735901 |
| wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 50.4325897832 |
| XAUt / sfrxETH 0.3% | uniswap-v4-ethereum | 0x0953...9382 | 2176.2890498247 |
| wstETH / sfrxETH-stETH-rETH-BPT / sfrxETH / rETH 0.04% | balancer_ethereum | 0x8e85...048b | 3864.1322411198 |
| XAUt / sfrxETH 1% | uniswap-v4-ethereum | 0x81bd...2aff | 3304.4171312935 |
| sfrxETH / ETH 99.91% | uniswap-v4-ethereum | 0x0ee6...f53a | 402.0688938132 |
| USDC / sfrxETH 81% | uniswap-v4-ethereum | 0x103e...62bb | 685.7302687168 |
| sfrxETH / WETH 0.01% | uniswap_v3 | 0x14d8...de6a | 2752.04794813593 |
| sfrxETH / WETH 0.05% | uniswap_v3 | 0xeed4...7d8b | 3198.3691467915 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.