| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WETH / USDC 0.05% | uniswap_v3 | 0x88e6...5640 | 1977.4861918898 |
| WBTC / WETH 0.05% | uniswap_v3 | 0x4585...20c0 | 1977.48619188975 |
| crvUSD / WETH / CRV | curve | 0x4ebd...4a14 | 1954.53178485477 |
| WETH / USDT 0.3% | uniswap_v3 | 0x4e68...fa36 | 1977.4861918898 |
| WETH / USDT 0.01% | uniswap_v3 | 0xc7bb...0e9b | 1977.4861918898 |
| WBTC / WETH 0.3% | uniswap_v3 | 0xcbcd...62ed | 1977.48619188975 |
| USDC / WETH 0.3% | uniswap_v3 | 0x8ad5...e6d8 | 1977.48619034914 |
| USDC / WETH | uniswap-v4-ethereum | 0xe500...a657 | 1976.84399178121 |
| WETH / USDT 0.05% | uniswap_v3 | 0x11b8...97f6 | 1977.4861918898 |
| USDC / WETH 0.01% | uniswap_v3 | 0xe055...939f | 1977.4887889498 |
| crvUSD / WETH | curve | 0x6e54...a9c2 | 1945.57244183758 |
| USDT / WBTC / WETH | curve | 0xf5f5...e2b4 | 0.9937037045 |
| USDT / WETH | uniswap-v4-ethereum | 0x9007...79b3 | 1976.84399178121 |
| weETH / WETH | curve | 0xdb74...ded5 | 1957.39229351103 |
| USDC / WBTC / WETH | curve | 0x7f86...829b | 0.9899929081 |
| USDT / WBTC / WETH | curve | 0xd51a...ae46 | 0.989646798 |
| ETH+ / WETH | curve | 0x2c68...353e | 1954.53178485477 |
| WISE / WETH | uniswap_v2 | 0x21b8...596e | 1975.17336450051 |
| wstETH / WETH 0.01% | uniswap_v3 | 0x1098...7daa | 1977.48619034914 |
| PEPE / WETH | uniswap_v2 | 0xa43f...ec9f | 1977.75280676795 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.