| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| vETH / WETH | curve | 0x6685...4726 | 2211.3819465388 |
| gVEC / vETH 3% | balancer_ethereum | 0x0f9f...8e5b | 3272.9004576847 |
| vETH / ETH 90% | uniswap-v4-ethereum | 0x1a3b...c156 | 290.4388432589 |
| vETH / wstETH / vETH/wstETH 0.04% | balancer_ethereum | 0xd3f8...3146 | 2114.3329293459 |
| vETH / WETH | uniswap_v2 | 0x9121...5816 | 768.1352891991 |
| pxETH / vETH | curve | 0x7f20...7050 | 3315.81663734162 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.