Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wstETH / AAVE 0.5% | balancer_ethereum | 0x3de2...9f29 | 2176.23333047523 |
wstETH / wstETH-WETH-BPT / WETH 0.01% | balancer_ethereum | 0x93d1...f0bd | 2470.2464705924 |
wstETH / WETH 0.01% | uniswap_v3 | 0x1098...7daa | 2173.17317945576 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 2122.45593979591 |
pufETH/wstETH / wstETH / pufETH 0.02% | balancer_ethereum | 0x63e0...3f02 | 2399.8888762491 |
pufETH / wstETH | curve | 0xeeda...980d | 2173.1770743545 |
wstETH / ETHx / ETHx/wstETH 0.04% | balancer_ethereum | 0xb911...8ea7 | 2159.83484252254 |
crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.997372301202375 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 3804.77830564855 |
ACX / wstETH 1% | balancer_ethereum | 0x36be...31a3 | 2169.98044383711 |
tETH/wstETH / wstETH / tETH 0.05% | balancer_ethereum | 0x1d13...ad14 | 2944.4588258345 |
wstETH / DOG | uniswap_v2 | 0x801c...386c | 2170.36319977145 |
wstETH / rsETH 0.05% | uniswap_v3 | 0x7a27...2eee | 2170.9769452789 |
wstETH / ankrETH/wstETH / aETHc 0.04% | balancer_ethereum | 0xdfe6...b6ba | 3340.7795911226 |
cdcETH/wstETH / wstETH / CDCETH 0.04% | balancer_ethereum | 0x740a...d99d | 4685.8204589545 |
wstETH / WETH 0.04% | balancer_ethereum | 0x3229...0230 | 2123.03893165854 |
ynETH / wstETH | curve | 0x19b8...4bdd | 2173.03354279594 |
tETH / wstETH | curve | 0xa10d...ddb1 | 2103.10396358262 |
mstETH / wstETH 0.01% | pancakeswap-v3-ethereum | 0x350d...b66b | 2188.02224218401 |
amphrETH / wstETH 0.3% | uniswap_v3 | 0xf3ae...ef3c | 2140.44097824348 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.