| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wTAO / WETH 1% | uniswap_v3 | 0x433a...1bbc | 221.378745108569 |
| wTAO / USDC 1% | uniswap_v3 | 0xf763...7e94 | 229.946449332121 |
| wTAO / WETH 0.3% | uniswap_v3 | 0x2982...61ae | 229.91897668638 |
| wTAO / ETH 0.3% | uniswap-v4-ethereum | 0x3582...7f20 | 230.619064058342 |
| wTAO / USDC 1% | uniswap-v4-ethereum | 0x67e0...690c | 228.762812161789 |
| rust / wTAO 1% | uniswap-v4-ethereum | 0x2560...6e0e | 240.354084956589 |
| wTAO / stTAO 0.3% | uniswap-v4-ethereum | 0x159c...4aae | 220.997077718424 |
| wTAO / ETH 1% | uniswap-v4-ethereum | 0x8719...8ede | 224.151546627968 |
| wTAO / stTAO 1% | uniswap_v3 | 0x6042...e6c1 | 218.3531917488 |
| rsTAO / wTAO | curve | 0x8005...0948 | 268.1296141766 |
| wTAO / USDC 0.3% | uniswap_v3 | 0x08c8...4a14 | 368.9399602303 |
| wTAO / WETH 0.3% | balancer-v3-ethereum | 0x1e7c...38a9 | 462.203208991 |
| PSI/acc / wTAO | uniswap_v2 | 0xfc9c...a917 | 386.5848471572 |
| wTAO / USDC 0.3% | uniswap-v4-ethereum | 0xe0b3...b534 | 361.4392763151 |
| wTAO / USDT 1% | uniswap_v3 | 0xfeb6...b455 | 331.6803665698 |
| wTAO / tTAO 0.01% | uniswap-v4-ethereum | 0x9191...11c7 | 244.8976946034 |
| XYO / wTAO 0.3% | uniswap-v4-ethereum | 0xaf00...e6ea | 399.7620910621 |
| stTAO / wTAO 0.3% | uniswap_v3 | 0x09dc...6d45 | 427.0176848633 |
| KIZUNA / wTAO 1% | uniswap_v3 | 0x0342...20c2 | 234.606237946956 |
| wTAO / MASA 1% | uniswap_v3 | 0x20da...3acd | 187.8180358412 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.