| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| weETH / ETH | fluid-ethereum | 0x86f8...99ce | 3255.5767204927 |
| weETH / WETH | curve | 0xdb74...ded5 | 3224.58589841988 |
| weETH / WETH 0.05% | uniswap_v3 | 0x7a41...cae3 | 3270.19743869533 |
| weETH / WETH 0.01% | uniswap_v3 | 0x202a...9b93 | 3255.64320632374 |
| tETH / weETH | curve | 0x394a...542f | 3228.07401639353 |
| weETH / WETH | curve | 0x1394...463b | 3226.07214208917 |
| weETH / rsETH | curve | 0x6683...cedd | 3246.63364151443 |
| weETH / weETHs | curve | 0xb9ef...7294 | 3459.16659201362 |
| tETH / weETH | curve | 0xa360...75a3 | 3427.04043254423 |
| weETH / ETH 0.01% | uniswap-v4-ethereum | 0xa2aa...15ed | 3455.58306477909 |
| weETH / ETH 0.3% | uniswap-v4-ethereum | 0xbba0...3f05 | 3475.06104803003 |
| weETH / WETH 0.3% | uniswap_v3 | 0x6f5c...ea07 | 3623.49463666242 |
| weETH / rswETH | curve | 0x278c...29db | 3460.34400524827 |
| weETHk / weETH | curve | 0x2fd6...f8c4 | 3615.74148943165 |
| wstETH / weETH 0.05% | uniswap_v3 | 0xf47f...4182 | 3614.02383342149 |
| sUSDe / weETH 0.3% | uniswap-v4-ethereum | 0x5c65...05b6 | 3039.4103649073 |
| weETHs / weETH 0.005% | uniswap-v4-ethereum | 0x8c71...4a76 | 3499.5198955092 |
| weETH / weETHs / weETHk | curve | 0x6a8a...1ae6 | 3622.68974007571 |
| ETHFI / weETH | curve | 0xcccd...2a7e | 3504.39839602914920953411302414529429339718731711075246846660368 |
| RZR / weETH 1% | balancer-v3-ethereum | 0x3f89...cfe0 | 3381.2820046919 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.