| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wTAO / WETH 1% | uniswap_v3 | 0x433a...1bbc | 250.493156804 |
| wTAO / USDC 1% | uniswap_v3 | 0xf763...7e94 | 247.9118023545 |
| wTAO / WETH 0.3% | uniswap_v3 | 0x2982...61ae | 249.8382172066 |
| wTAO / ETH 0.3% | uniswap-v4-ethereum | 0x3582...7f20 | 249.9520471172 |
| wTAO / USDC 1% | uniswap-v4-ethereum | 0x67e0...690c | 250.0569372727 |
| wTAO / stTAO 0.3% | uniswap-v4-ethereum | 0x159c...4aae | 254.9923880538 |
| wTAO / TrumpBucks 1% | uniswap-v4-ethereum | 0xfdc8...06db | 251.4078663671 |
| KIZUNA / wTAO 1% | uniswap_v3 | 0x0342...20c2 | 246.057675259147 |
| wTAO / stTAO 1% | uniswap_v3 | 0x6042...e6c1 | 176.9240617568 |
| wTAO / USDC 0.3% | uniswap-v4-ethereum | 0xe0b3...b534 | 329.8168363694 |
| rsTAO / wTAO | curve | 0x8005...0948 | 268.1296141766 |
| wTAO / USDC 0.3% | uniswap_v3 | 0x08c8...4a14 | 368.9399602303 |
| wstTAO / wTAO | curve | 0xf2dc...cf88 | 504.824672082618 |
| YTAO / wTAO | uniswap_v2 | 0x9d7a...d376 | 501.100449499731 |
| wTAO / WETH 0.3% | balancer-v3-ethereum | 0x1e7c...38a9 | 462.203208991 |
| rust / wTAO 1% | uniswap-v4-ethereum | 0x2560...6e0e | 246.283018237433 |
| PSI/acc / wTAO | uniswap_v2 | 0xfc9c...a917 | 295.4466377884 |
| TEE / wTAO 1% | uniswap_v3 | 0x20cb...5d06 | 642.083755902513 |
| wTAO / ETH 1% | uniswap-v4-ethereum | 0x8719...8ede | 249.5606480255 |
| wTAO / BTBB | uniswap_v2 | 0x9945...5071 | 243.7523445155 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.