| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wTAO / WETH 1% | uniswap_v3 | 0x433a...1bbc | 285.900653096677 |
| wTAO / USDC 1% | uniswap_v3 | 0xf763...7e94 | 286.289575041998 |
| wTAO / WETH 0.3% | uniswap_v3 | 0x2982...61ae | 287.481987374735 |
| wTAO / ETH 0.3% | uniswap-v4-ethereum | 0x3582...7f20 | 286.411765981746 |
| wTAO / USDC 1% | uniswap-v4-ethereum | 0x67e0...690c | 286.988788372753 |
| wTAO / ETH 1% | uniswap-v4-ethereum | 0x8719...8ede | 293.127620350017 |
| wTAO / stTAO 0.3% | uniswap-v4-ethereum | 0x159c...4aae | 286.898024239499 |
| rust / wTAO 1% | uniswap-v4-ethereum | 0x2560...6e0e | 292.803830429567 |
| wTAO / tTAO 0.01% | uniswap_v3 | 0x7442...e26e | 297.506953697013 |
| wTAO / stTAO 1% | uniswap_v3 | 0x6042...e6c1 | 347.6633451417 |
| rsTAO / wTAO | curve | 0x8005...0948 | 268.1296141766 |
| wTAO / USDC 0.3% | uniswap_v3 | 0x08c8...4a14 | 368.9399602303 |
| wTAO / WETH 0.3% | balancer-v3-ethereum | 0x1e7c...38a9 | 462.203208991 |
| wTAO / tTAO 0.01% | uniswap-v4-ethereum | 0x9191...11c7 | 303.999576947766 |
| PSI/acc / wTAO | uniswap_v2 | 0xfc9c...a917 | 386.5848471572 |
| wTAO / USDT 1% | uniswap_v3 | 0xfeb6...b455 | 331.6803665698 |
| vTAO / wTAO 0.01% | uniswap-v4-ethereum | 0x427b...d74d | 388.8713718496 |
| XYO / wTAO 0.3% | uniswap-v4-ethereum | 0xaf00...e6ea | 399.7620910621 |
| stTAO / wTAO 0.3% | uniswap_v3 | 0x09dc...6d45 | 427.0176848633 |
| KIZUNA / wTAO 1% | uniswap_v3 | 0x0342...20c2 | 288.454136154247 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.