| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| frxUSD / crvUSD | curve | 0x13e1...43e1 | 1.0251971375 |
| avUSD / frxUSD | curve | 0xf763...e46e | 1.0017112553702502884226626300085054079930263997468423877030381152 |
| pmUSD / frxUSD | curve | 0xbf50...b900 | 1.0027089687571285536003146830083762393924560991939027772765752216 |
| sfrxUSD / frxUSD | curve | 0xf292...5978 | 1.0146997872658282382876048237138487838636161158100800813895881216 |
| frxUSD / msUSD | curve | 0x9a9e...4d1b | 1.0242904355 |
| WFRAX / frxUSD | fraxswap_ethereum | 0x0fe0...0f87 | 1.01340870728805 |
| frxUSD / sUSDS | curve | 0x81a2...c4b7 | 0.892477853 |
| alUSD / frxUSD | curve | 0x17f9...9fa3 | 1.0238119444588955017411048998600144904207809579687939414005441376 |
| frxUSD / scrvUSD | curve | 0x4d96...e5f3 | 0.8777798643 |
| evaUSDT / frxUSD | curve | 0x5528...4116 | 1.0147001102903389983909634267746649140969316973395500698352505504 |
| FRAX / frxUSD | curve | 0xbbaf...cacc | 1.0007676889730100926732104016675775008304948890898955323773523996 |
| USDe / frxUSD 0.01% | uniswap-v4-ethereum | 0x2552...1847 | 1.00474875067348 |
| frxUSD / OUSD | curve | 0x68d0...1f49 | 1.0038004676 |
| USDaf / frxUSD | curve | 0x20d4...f52c | 1.0146997872658282382876048237138487838636161158100800813895881216 |
| frxUSD / KRWQ | curve | 0x26d8...133c | 1.0017505893 |
| fxUSD / frxUSD | curve | 0x8519...cb5e | 0.990123527092744 |
| frxUSD / ebUSD | curve | 0x31d5...3a9a | 1.0017152036 |
| frxUSD / DFiUSD 0.01% | uniswap-v4-ethereum | 0x7a3a...0354 | 1.0083613953 |
| frxUSD / USDC 0.05% | uniswap-v4-ethereum | 0xd730...9cad | 0.9993623319 |
| reUSD / frxUSD | curve | 0x4211...d395 | 1.0007105563632872305378410052748056319952891550520505970893306144 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.