Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wstETH / WETH 0.01% | uniswap_v3 | 0x1098...7daa | 4561.97234549029 |
wstETH / AAVE 0.5% | balancer_ethereum | 0x3de2...9f29 | 4540.08722765872 |
wstETH / wstETH-WETH-BPT / WETH 0.01% | balancer_ethereum | 0x93d1...f0bd | 4654.07570815976 |
tETH/wstETH / wstETH / tETH 0.05% | balancer_ethereum | 0x1d13...ad14 | 4547.5824603907 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 4653.20220971585 |
tETH / wstETH | curve | 0xa10d...ddb1 | 4516.05906827731 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 3804.77830564855 |
crvUSD / tBTC / wstETH | curve | 0x2889...3d13 | 0.995524066619881 |
WBTC / wstETH 0.3% | uniswap-v4-ethereum | 0xef3a...7e14 | 4579.39090194206 |
pufETH / wstETH | curve | 0xeeda...980d | 4516.4600759298 |
wstETH / rsETH 0.05% | uniswap_v3 | 0x7a27...2eee | 4543.28313001183 |
wstETH / DOG | uniswap_v2 | 0x801c...386c | 4539.83834580352 |
ACX / wstETH 1% | balancer_ethereum | 0x36be...31a3 | 4542.16613065777 |
wstETH / USDC 0.05% | uniswap_v3 | 0x4622...f863 | 4561.97325976904 |
tBTC / wstETH 0.3% | uniswap_v3 | 0xf3db...99be | 4545.33432378156 |
ETH / wstETH 0.01% | uniswap-v4-ethereum | 0x1d5b...2d76 | 4561.66239278927 |
pufETH/wstETH / wstETH / pufETH 0.02% | balancer_ethereum | 0x63e0...3f02 | 3037.9917753166 |
wstETH / ankrETH/wstETH / aETHc 0.04% | balancer_ethereum | 0xdfe6...b6ba | 4653.16309078131 |
wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 4515.05910356713 |
wstETH / ETHx / ETHx/wstETH 0.04% | balancer_ethereum | 0xb911...8ea7 | 4552.6196047405 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.