Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wstETH / WETH 0.01% | uniswap_v3 | 0x1098...7daa | 4133.12985647163 |
pufETH / wstETH | curve | 0xeeda...980d | 4137.80362207771 |
wstETH / wstETH-WETH-BPT / WETH 0.01% | balancer_ethereum | 0x93d1...f0bd | 4130.2137873642928356681764853967922862777954963564987168028515380102438218550237157903276 |
wstETH / AAVE 0.5% | balancer_ethereum | 0x3de2...9f29 | 4133.50300778845 |
wstETH-rETH-sfrxETH-BPT / sfrxETH / rETH / wstETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 4073.23698605697 |
wstETH / DOG | uniswap_v2 | 0x801c...386c | 4137.24105230235 |
wstETH / ETHx | curve | 0x1475...334f | 4169.53115309906 |
wstETH / cbETH 0.01% | balancer_ethereum | 0xf7a8...b134 | 4128.81105639905 |
wstETH / sfrxETH / rETH | curve | 0x2570...7193 | 4073.31453631803 |
wstETH-rETH-sfrxETH-BPT / sfrxETH / rETH / wstETH | balancer_ethereum | 0x5aee...cabe | 2647.40759087783 |
wstETH / WETH 0.01% | pancakeswap-v3-ethereum | 0x3a1b...d4f8 | 4133.22433228496 |
crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.99071086238638 |
pufETH / wstETH | curve | 0xb3c8...06c9 | 4133.11407070251 |
wstETH / USDC 0.3% | uniswap_v3 | 0x1738...ab29 | 4123.50938670482 |
ACX / wstETH 1% | balancer_ethereum | 0x36be...31a3 | 4128.10886027477 |
wstETH / WETH 0.005% | solidly-v3 | 0x4370...5b1c | 4131.64389201876 |
mwstETH-WPUNKS:40 / wstETH | curve | 0x2a7f...cd79 | 4127.52764441728 |
wstETH / HARAMBE 1% | uniswap_v3 | 0x58ee...27e7 | 4139.49718157397 |
wstETH / USDC 0.05% | uniswap_v3 | 0x4622...f863 | 4129.77782731765 |
mwstETH-WPUNKS:20 / wstETH | curve | 0xfe3c...72ed | 4143.28267372434 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.