| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| stETH / ETH | curve | 0xdc24...7022 | 1953.3384527419 |
| stETH / frxETH | curve | 0x4d9f...831e | 1962.4586980909 |
| ETH / stETH | curve | 0x21e2...843a | 1954.83530730189 |
| stETH / WETH | uniswap_v2 | 0x4028...55c4 | 1980.3918091041 |
| pxETH / stETH | curve | 0x6951...edb6 | 1983.6923320683536443958038760038778063511477377431155829775590186 |
| stETH / WETH 1% | uniswap_v3 | 0x6381...bd7d | 1981.1705638152 |
| stETH / WETH | curve | 0x828b...6056 | 1963.7740295012 |
| MANA / stETH | uniswap_v2 | 0x06a0...7a25 | 1976.28319957012 |
| stETH / USDT | uniswap_v2 | 0x648e...42c5 | 2041.452794029 |
| yETH / stETH | curve | 0xd3f4...eb16 | 4100.8976068485 |
| xETH / stETH | curve | 0xd4ce...1f58 | 1889.33471869161 |
| rstETH / stETH | curve | 0x3dbd...a894 | 2445.62383785881 |
| stETH / ETH0 | curve | 0x0cf7...199d | 1806.1546369428 |
| HARAMBE / stETH 1% | uniswap_v3 | 0xf7e6...33f7 | 1948.48512100332 |
| PEAK / stETH | uniswap_v2 | 0x09aa...595d | 1972.45297267464 |
| stETH / wBETH | curve | 0x525e...85b5 | 2140.6482613107 |
| CLV / stETH 6% | balancer_ethereum | 0x6803...d551 | 1938.8932097242 |
| sETH2 / stETH | curve | 0xe95e...9308 | 1956.35175551898 |
| stETH / USDC 0.3% | uniswap_v3 | 0x6c83...e2c5 | 2980.1291810177 |
| rstETH / stETH | uniswap_v2 | 0xcdf7...32a2 | 2836.4086962591 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.