| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sfrxUSD / frxUSD | curve | 0xf292...5978 | 1.1662046032968 |
| reUSD / sfrxUSD | curve | 0xed78...a441 | 1.16509521576096 |
| dUSD / sfrxUSD | curve | 0x2c2a...cef9 | 1.1662046032968 |
| sfrxUSD / scrvUSD | curve | 0x15e4...5752 | 1.16302822695889 |
| sfrxUSD / USDe | curve | 0x86fe...a25e | 1.1653193776771 |
| WFRAX / sfrxUSD | carbon-defi-ethereum | 0xc537...2191 | 1.17632736703478 |
| sdUSD / sfrxUSD | curve | 0x4de6...57fd | 1.16288922254376 |
| litUSD / sfrxUSD | curve | 0x640b...cfa6 | 1.16081513065539 |
| sfrxUSD / sUSDe | curve | 0x3bd1...d6e2 | 1.17141590822458 |
| sfrxUSD / ETH 99.9% | uniswap-v4-ethereum | 0x9f51...645d | 0.6039312573 |
| sfrxUSD / WETH | uniswap_v2 | 0x001d...5324 | 0.2952715673 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.