| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHx / ETH | curve | 0x59ab...1492 | 2233.0131735861 |
| wstETH / ETHx 0.01% | pancakeswap-v3-ethereum | 0x5172...e67d | 2129.86076596402 |
| ETHx / WETH | curve | 0xd82c...838b | 2179.0153536889 |
| wstETH / ETHx 0.01% | blueprint | 0x4933...48ce | 2194.72095516787 |
| ETHx / wstETH 0.01% | uniswap_v3 | 0xc9ed...faa1 | 2199.0133650317 |
| ETHx / USDC 0.01% | pancakeswap-v3-ethereum | 0xb803...6439 | 2207.2326010715 |
| B-ETHx/bb-a-WETH / ETHx / bb-a-WETH 0.04% | balancer_ethereum | 0x4cbd...6163 | 1844.14116748325 |
| InETHx / ETHx | curve | 0x952d...5832 | 3242.1308281836 |
| ETHx / WETH 0.05% | pancakeswap-v3-ethereum | 0x4d4c...e0f8 | 2156.3077661725 |
| wstETH / ETHx | curve | 0x1475...334f | 2067.2686513409 |
| SD / ETHx 0.3% | balancer_ethereum | 0x034e...76ea | 2163.20450720937 |
| wstETH / ETHx | curve | 0x7264...9b63 | 1971.6390726359 |
| ETHx / WETH | curve | 0x0024...346e | 1864.3081313271 |
| rsETH / ETHx 0.3% | uniswap_v3 | 0x6493...5485 | 2216.0553590274 |
| ETHx / USDC 0.04% | kyberswap_elastic | 0xcbec...9e8c | 0.0558545498155928 |
| ETHx / WETH 0.05% | uniswap_v3 | 0x1b96...f578 | 3337.654055189 |
| ETHx / USDT 88% | uniswap-v4-ethereum | 0xa677...9743 | 398.1327420093 |
| LOCK / ETHx 6.66% | uniswap-v4-ethereum | 0x0601...5ca3 | 2139.6750968765 |
| ETHx / frxETH | curve | 0x4029...fa21 | 5062.504554218 |
| ETHx / USDC 0.05% | pancakeswap-v3-ethereum | 0x1319...424e | 2713.89398884454 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.