| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| weETHs / ETH | fluid-ethereum | 0x0805...7640 | 3090.85884337163 |
| weETHs / WETH | curve | 0xb92b...1391 | 3120.77028495417 |
| weETH / weETHs | curve | 0xb9ef...7294 | 3086.87802478647 |
| weETH / weETHs / weETHk | curve | 0x6a8a...1ae6 | 3087.07888225455 |
| weETHs / ETH 1% | uniswap-v4-ethereum | 0x7541...34ea | 4059.8630520809 |
| weETHs / ETH 90% | uniswap-v4-ethereum | 0xc92c...64a2 | 453.8420962537 |
| weETHs / ETH 2% | uniswap-v4-ethereum | 0xb32d...1ddb | 4450.4809036098 |
| weETHs / USDC 88% | uniswap-v4-ethereum | 0xccf9...7ac0 | 360.0602128695 |
| weETHs / WETH 0.3% | uniswap_v3 | 0x174e...3d6a | 2793.6274067478 |
| weETHs / WETH 0.05% | uniswap_v3 | 0x5832...516a | 2639.5609557411 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.