| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 3782.89314294246 |
| sfrxETH / rsETH | curve | 0x3772...5810 | 3559.6432281972 |
| wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 2506.7407368555 |
| InsfrxETH / sfrxETH | curve | 0x1506...1236 | 4295.0239953359 |
| sfrxETH / ICHI 1% | uniswap_v3 | 0xa19f...2542 | 710.562125735901 |
| wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 0.003408592204 |
| wstETH / sfrxETH-stETH-rETH-BPT / sfrxETH / rETH 0.04% | balancer_ethereum | 0x8e85...048b | 4518.0608872345 |
| InsfrxETH / sfrxETH 0.05% | uniswap_v3 | 0x7755...1d81 | 3661.22731119144 |
| sfrxETH / WETH 1% | uniswap_v3 | 0x91eb...0523 | 3950.497294454 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.