| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| weETH / WETH 0.05% | uniswap_v3 | 0x7a41...cae3 | 2524.3353680445 |
| weETH / wstETH 0.01% | uniswap-v4-ethereum | 0x034c...80f1 | 2527.440882888 |
| weETH / WETH 0.01% | uniswap_v3 | 0x202a...9b93 | 2524.190750526 |
| weETH / WETH | curve | 0xdb74...ded5 | 2523.606001061 |
| tETH / weETH | curve | 0x394a...542f | 2523.58275699181 |
| weETH / WETH | curve | 0x1394...463b | 2526.9340168228 |
| weETH / rswETH | curve | 0x278c...29db | 2512.4874242554 |
| tETH / weETH | curve | 0xa360...75a3 | 2490.45217242401 |
| weETH / ETH 0.01% | uniswap-v4-ethereum | 0xa2aa...15ed | 2522.7603990844 |
| weETH / rsETH | curve | 0x6683...cedd | 2505.7445668126 |
| weETH / ETH | fluid-ethereum | 0x86f8...99ce | 2560.3116459226 |
| weETH / WETH 0.3% | uniswap_v3 | 0x6f5c...ea07 | 2490.9328474281 |
| wstETH / weETH 0.05% | uniswap_v3 | 0xf47f...4182 | 2594.90706878534 |
| sUSDe / weETH 0.3% | uniswap-v4-ethereum | 0x5c65...05b6 | 3039.4103649073 |
| waEthWETH / weETH 0.005% | balancer-v3-ethereum | 0xb1ce...4e37 | 2415.022835794 |
| weETHs / weETH 0.005% | uniswap-v4-ethereum | 0x8c71...4a76 | 3499.5198955092 |
| USDY / weETH | curve | 0x9e30...d36c | 3916.37122464022 |
| weETH / weETHs / weETHk | curve | 0x6a8a...1ae6 | 2429.8610655984 |
| weETH / weETHs | curve | 0xb9ef...7294 | 2227.2624886956 |
| ETHFI / weETH | curve | 0xcccd...2a7e | 2629.70588215831 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.