| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| waEthLidowstETH / waEthLidoWETH 0.002% | balancer-v3-ethereum | 0xc4ce...f812 | 3103.80676864353 |
| waEthLidoWETH / TREE 0.8% | balancer-v3-ethereum | 0xdaba...45a2 | 3124.68583007176 |
| waEthLidoWETH / SDEX 1% | balancer-v3-ethereum | 0xe233...c703 | 3083.92373463805 |
| waEthLidoWETH / UNI / WBTC / LINK / DAI / MKR / waEthUSDC 0.1% | balancer-v3-ethereum | 0x7dcd...778c | 3964.9375150512 |
| waEthLidoWETH / AAVE 0.25% | balancer-v3-ethereum | 0x6cc9...74a1 | 4599.4937689549 |
| waEthLidoWETH / USDC | balancer-v3-ethereum | 0x3227...56c7 | 3959.483223344 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.