| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / ETH | fluid-ethereum | 0x0b1a...c9e7 | 2783.9680171567 |
| wstETH / WETH 0.01% | uniswap_v3 | 0x1098...7daa | 2782.8886019397 |
| weETH / wstETH 0.01% | uniswap-v4-ethereum | 0x034c...80f1 | 2785.67878911905 |
| wstETH / AAVE 0.292% | balancer_ethereum | 0x3de2...9f29 | 2783.650032135 |
| pufETH / wstETH | curve | 0xeeda...980d | 2757.81492995333 |
| WBTC / wstETH 0.25% | uniswap-v4-ethereum | 0x5829...7ae4 | 2778.2558348536 |
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 2795.8653532328 |
| ETH / wstETH 0.01% | uniswap-v4-ethereum | 0x1d5b...2d76 | 2787.37575153644 |
| wstETH / ETH 0.005% | ekubo-v3-ethereum | 0x0000...d6f9 | 2780.8586241562 |
| wstETH / ETH 0.005% | ekubo-v3-ethereum | 0x0000...6718 | 2782.8334393123 |
| 1INCH / wstETH 1% | uniswap-v4-ethereum | 0x1d6e...ea6f | 2791.219216176 |
| crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.9976741667 |
| tETH / wstETH | curve | 0xa10d...ddb1 | 2753.69815222874 |
| rETH / wstETH | curve | 0x447d...cb08 | 2748.85731903198 |
| PNK / wstETH 0.3% | uniswap-v4-ethereum | 0xbb78...580e | 2782.66143471046 |
| wstETH / WETH 0.05% | cypher | 0x80c3...04e1 | 2792.8546776523 |
| tETH / wstETH 0.05% | uniswap_v3 | 0x28c5...e77e | 2861.62536356278 |
| rETH / wstETH 0.05% | uniswap-v4-ethereum | 0xa068...b9a2 | 2773.84187210261 |
| rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 2779.1825548641 |
| wstETH / DOG | uniswap_v2 | 0x801c...386c | 2778.3122344358 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.