Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wTAO / WETH 0.3% | uniswap_v3 | 0x2982...61ae | 357.247115697076 |
tTAO / wTAO 0.05% | uniswap_v3 | 0xaf32...5948 | 353.64190023727 |
wTAO / USDC 1% | uniswap_v3 | 0xf763...7e94 | 356.120293636828 |
stTAO / wTAO 0.3% | uniswap_v3 | 0x09dc...6d45 | 354.384403665821 |
wTAO / WETH 1% | uniswap_v3 | 0x433a...1bbc | 351.359137425513 |
wTAO / ETH 0.3% | uniswap-v4-ethereum | 0x3582...7f20 | 353.34928268317 |
wTAO / stTAO 1% | uniswap_v3 | 0x6042...e6c1 | 354.437065708493 |
XYO / wTAO 0.3% | uniswap-v4-ethereum | 0xaf00...e6ea | 354.857331327081 |
wTAO / USDT 1% | uniswap_v3 | 0xfeb6...b455 | 348.558419477801 |
KIZUNA / wTAO 1% | uniswap_v3 | 0x0342...20c2 | 353.538012970879 |
wTAO / WETH | uniswap_v2 | 0x9a9f...94fd | 258.065483981509 |
rsTAO / wTAO | curve | 0x8005...0948 | 268.1296141766 |
wstTAO / wTAO | curve | 0xf2dc...cf88 | 504.824672082618 |
YTAO / wTAO | uniswap_v2 | 0x9d7a...d376 | 501.100449499731 |
PSI/acc / wTAO | uniswap_v2 | 0xfc9c...a917 | 253.0153347448 |
TEE / wTAO 1% | uniswap_v3 | 0x20cb...5d06 | 642.083755902513 |
wTAO / crvUSD / pepecoin | curve | 0x3570...9138 | 292.0995936517 |
wTAO / MASA 1% | uniswap_v3 | 0x20da...3acd | 187.8180358412 |
wTAO / WETH 1% | blueprint | 0x4a94...f180 | 255.1616081535 |
PSI/ACC / wTAO 1% | uniswap_v3 | 0x1265...0ab5 | 323.437411217576 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.