Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ezETH-WETH-BPT / ezETH / WETH 0.04% | balancer_ethereum | 0x5961...cc0e | 1910.81056326719 |
weETH/ezETH/rswETH / ezETH / weETH / rswETH 0.04% | balancer_ethereum | 0x848a...9a54 | 1910.88382091267 |
wstETH / ezETH 0.05% | uniswap_v3 | 0x1b9d...0bc0 | 2287.89191138311 |
ezETH / WETH 0.01% | uniswap_v3 | 0xbe80...0a63 | 2310.39702212658 |
ezETH / pzETH | curve | 0x8c65...934b | 1889.52718172904 |
ezETH / WETH 0.01% | maverick-v2-eth | 0x707e...f171 | 1808.7796080865 |
ezETH / WETH | curve | 0x85de...c12e | 1923.78662604448 |
DAI / ezETH 1% | sushiswap-v3-ethereum | 0x3ce7...7f09 | 2150.7011387567 |
ezETH / WETH | uniswap_v2 | 0x2392...26fb | 1489.80823882516 |
ezETH / WETH 0.03% | maverick-v2-eth | 0x5e80...6159 | 2094.5742676367 |
ezETH / wstETH 0.01% | uniswap_v3 | 0x29ef...d713 | 2678.43526796282 |
ezETH / WETH 0.3% | uniswap_v3 | 0xd91d...93aa | 2493.54899552497 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.