| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wTAO / WETH 1% | uniswap_v3 | 0x433a...1bbc | 205.0904774666 |
| wTAO / USDC 1% | uniswap_v3 | 0xf763...7e94 | 205.058950701 |
| wTAO / WETH 0.3% | uniswap_v3 | 0x2982...61ae | 206.3683546272 |
| wTAO / ETH 0.3% | uniswap-v4-ethereum | 0x3582...7f20 | 207.1152099659 |
| wTAO / USDC 1% | uniswap-v4-ethereum | 0x67e0...690c | 206.8752844086 |
| wTAO / stTAO 0.3% | uniswap-v4-ethereum | 0x159c...4aae | 205.2946573464 |
| rust / wTAO 1% | uniswap-v4-ethereum | 0x2560...6e0e | 209.390080145295 |
| wTAO / TrumpBucks 1% | uniswap-v4-ethereum | 0xfdc8...06db | 209.8228389789 |
| wTAO / ETH 1% | uniswap-v4-ethereum | 0x8719...8ede | 206.4711404369 |
| wTAO / BTBB | uniswap_v2 | 0x9945...5071 | 206.6550594192 |
| wTAO / WETH 0.05% | uniswap_v3 | 0x0dd9...468e | 237.8158055609 |
| wTAO / stTAO 1% | uniswap_v3 | 0x6042...e6c1 | 176.9240617568 |
| rsTAO / wTAO | curve | 0x8005...0948 | 268.1296141766 |
| wTAO / USDC 0.3% | uniswap_v3 | 0x08c8...4a14 | 368.9399602303 |
| wstTAO / wTAO | curve | 0xf2dc...cf88 | 504.824672082618 |
| YTAO / wTAO | uniswap_v2 | 0x9d7a...d376 | 501.100449499731 |
| wTAO / WETH 0.3% | balancer-v3-ethereum | 0x1e7c...38a9 | 462.203208991 |
| PSI/acc / wTAO | uniswap_v2 | 0xfc9c...a917 | 386.5848471572 |
| TEE / wTAO 1% | uniswap_v3 | 0x20cb...5d06 | 642.083755902513 |
| wTAO / USDC 0.3% | uniswap-v4-ethereum | 0xe0b3...b534 | 361.4392763151 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.