| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETHx / ETH | curve | 0x59ab...1492 | 3079.67398723851 |
| wstETH / ETHx 0.01% | pancakeswap-v3-ethereum | 0x5172...e67d | 3104.78677081002 |
| ETHx / WETH | curve | 0xd82c...838b | 3082.20497173707 |
| ETHx / WETH 0.05% | pancakeswap-v3-ethereum | 0x4d4c...e0f8 | 3147.65532579794 |
| ETHx / USDC 0.01% | pancakeswap-v3-ethereum | 0xb803...6439 | 3071.53868440007 |
| wstETH / ETHx 0.01% | blueprint | 0x4933...48ce | 3096.92498990191 |
| ETHx / wstETH 0.01% | uniswap_v3 | 0xc9ed...faa1 | 3148.03366510646 |
| wstETH / ETHx | curve | 0x1475...334f | 3169.95063033934 |
| SD / ETHx 0.3% | balancer_ethereum | 0x034e...76ea | 3202.49970714631 |
| wstETH / ETHx | curve | 0x7264...9b63 | 1971.6390726359 |
| ETHx / WETH | curve | 0x0024...346e | 1864.3081313271 |
| rsETH / ETHx 0.3% | uniswap_v3 | 0x6493...5485 | 3151.6127915686 |
| LOCK / ETHx 6.66% | uniswap-v4-ethereum | 0x0601...5ca3 | 3163.1945475006 |
| ETHx / frxETH | curve | 0x4029...fa21 | 5062.504554218 |
| wstETH / ETHx / ETHx/wstETH 0.04% | balancer_ethereum | 0xb911...8ea7 | 1988.9131096443 |
| InETHx / ETHx 0.05% | uniswap_v3 | 0xb63e...86b5 | 2463.1598433241 |
| ETHx-WETH-BPT / ETHx / WETH 0.04% | balancer_ethereum | 0x37b1...b752 | 3983.7964848434 |
| rsETH / rsETH / ETHx / ETHx 0.04% | balancer_ethereum | 0x7761...2ade | 3635.5809762188 |
| ETHx / ETH 0.3% | uniswap-v4-ethereum | 0x91b8...5961 | 2313.6824252635 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.