| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / ETH | fluid-ethereum | 0x0b1a...c9e7 | 3862.91162807311 |
| wstETH / WETH 0.01% | uniswap_v3 | 0x1098...7daa | 3862.33558489228 |
| wstETH / AAVE 0.307% | balancer_ethereum | 0x3de2...9f29 | 3862.08824599599 |
| WBTC / wstETH 0.25% | uniswap-v4-ethereum | 0x5829...7ae4 | 3872.33298175046 |
| wstETH / rsETH 0.05% | uniswap_v3 | 0x7a27...2eee | 3859.91626491279 |
| crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.996145453424064 |
| ETH / wstETH 0.01% | uniswap-v4-ethereum | 0x1d5b...2d76 | 3862.25123091453 |
| pufETH / wstETH | curve | 0xeeda...980d | 3832.53547517365 |
| WLFI / wstETH 4.001% | uniswap-v4-ethereum | 0x5267...b180 | 3890.63266862055 |
| ETH / wstETH 0.005% | uniswap-v4-ethereum | 0x904e...0852 | 3875.61042282064 |
| tETH / wstETH | curve | 0xa10d...ddb1 | 3860.96452289872 |
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 3843.32367355872 |
| wstETH / DOG | uniswap_v2 | 0x801c...386c | 3874.63765596441 |
| wstETH / ETHx 0.01% | pancakeswap-v3-ethereum | 0x5172...e67d | 3859.91620353384 |
| rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 3851.55641070491 |
| tETH / wstETH 0.05% | uniswap_v3 | 0x28c5...e77e | 3862.27305673086 |
| pufETH / wstETH | curve | 0xb3c8...06c9 | 3817.87697394061 |
| rust / wstETH 0.3% | uniswap-v4-ethereum | 0xacec...5ff0 | 3861.65229531112 |
| ACX / wstETH 1% | balancer_ethereum | 0x36be...31a3 | 3880.97655346166 |
| swETH / wstETH 0.3% | uniswap-v4-ethereum | 0xe7c7...48d8 | 3814.62592160146 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.