| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHx / ETH | curve | 0x59ab...1492 | 3405.61230392024 |
| wstETH / ETHx 0.01% | pancakeswap-v3-ethereum | 0x5172...e67d | 3586.81604399789 |
| ETHx / wstETH 0.01% | uniswap_v3 | 0xc9ed...faa1 | 3588.81986330931 |
| ETHx / USDC 0.01% | pancakeswap-v3-ethereum | 0xb803...6439 | 3422.4842921225 |
| ETHx / WETH | curve | 0xd82c...838b | 3399.82106442516 |
| ETHx / WETH 0.05% | pancakeswap-v3-ethereum | 0x4d4c...e0f8 | 3610.5381574208 |
| wstETH / ETHx 0.01% | blueprint | 0x4933...48ce | 3419.37852197712 |
| wstETH / ETHx | curve | 0x1475...334f | 3547.6032913119 |
| rsETH / ETHx 0.3% | uniswap_v3 | 0x6493...5485 | 3641.1074198043 |
| SD / ETHx 0.3% | balancer_ethereum | 0x034e...76ea | 3367.79927829339 |
| wstETH / ETHx | curve | 0x7264...9b63 | 1971.6390726359 |
| ETHx / WETH | curve | 0x0024...346e | 1864.3081313271 |
| ETHx / WETH 0.05% | uniswap_v3 | 0x1b96...f578 | 3337.654055189 |
| ETHx / frxETH | curve | 0x4029...fa21 | 5062.504554218 |
| wstETH / ETHx / ETHx/wstETH 0.04% | balancer_ethereum | 0xb911...8ea7 | 1988.9131096443 |
| InETHx / ETHx 0.05% | uniswap_v3 | 0xb63e...86b5 | 2463.1598433241 |
| rsETH / rsETH / ETHx / ETHx 0.04% | balancer_ethereum | 0x7761...2ade | 3635.5809762188 |
| ETHx-WETH-BPT / ETHx / WETH 0.04% | balancer_ethereum | 0x37b1...b752 | 3983.7964848434 |
| ETHx / ETH 0.3% | uniswap-v4-ethereum | 0x91b8...5961 | 2313.6824252635 |
| LOCK / ETHx 6.66% | uniswap-v4-ethereum | 0x0601...5ca3 | 3261.76113110062 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.