SRX251
Appearance
![]() | |
Clinical data | |
---|---|
Other names | SRX-251; API-251; API251 |
Routes of administration | Oral[1][2] |
Drug class | Vasopressin V1A receptor antagonist |
Identifiers | |
| |
CAS Number | |
PubChem CID | |
ChemSpider | |
UNII | |
ChEMBL | |
Chemical and physical data | |
Formula | C43H48F3N5O5 |
Molar mass | 771.882 g·mol−1 |
3D model (JSmol) | |
| |
|
SRX251, or SRX-251, also known as API-251, is a selective vasopressin V1A receptor antagonist that is or was under development for the treatment of aggression.[1][3][4][2] It was also being developed for the treatment of dysmenorrhea, but development for this indication was discontinued.[1] The drug is taken by mouth.[1][2] SRX251 reduces aggressive behavior in rodents.[4][2] It is or was being developed by Azevan Pharmaceuticals.[1][3] In 2007, it was in phase 1 clinical trials.[1][3]
See also
[edit]References
[edit]- ^ a b c d e f "SRX 251". AdisInsight. 3 January 2024. Retrieved 24 February 2025.
- ^ a b c d Ferris CF, Lu SF, Messenger T, Guillon CD, Heindel N, Miller M, et al. (February 2006). "Orally active vasopressin V1a receptor antagonist, SRX251, selectively blocks aggressive behavior". Pharmacology, Biochemistry, and Behavior. 83 (2): 169–174. doi:10.1016/j.pbb.2006.01.001. PMID 16504276.
- ^ a b c "Delving into the Latest Updates on SRX-251 with Synapse". Synapse. 22 February 2025. Retrieved 24 February 2025.
- ^ a b Morrison TR, Melloni RH (2014). "The role of serotonin, vasopressin, and serotonin/vasopressin interactions in aggressive behavior". Current Topics in Behavioral Neurosciences. 17: 189–228. doi:10.1007/7854_2014_283. ISBN 978-3-662-44280-7. PMID 24496652.
AVP is involved in various CNS circuits that underlie many different processes, including those related to the regulation of aggressive behavior, and various studies have used AVP agonists and antagonists to promote or block aggressive behaviors. For example, in resident male hamsters, oral administration of the V1A antagonist SRX251 reduces bite frequencies, and increases attack latencies during resident-intruder testing (Ferris et al. 2006).