| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| waEthUSDT / waEthLidoGHO / waEthUSDC | balancer-v3-ethereum | 0x85b2...361d | 1.14958326465167 |
| PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3% | balancer-v3-ethereum | 0xb1f6...27c6 | 0.00000594227588934504 |
| USP / waEthUSDC 0.01% | balancer-v3-ethereum | 0x1149...9521 | 1.15856951910495 |
| waEthUSDT / waEthUSDC 0.001% | balancer-v3-ethereum | 0x89bb...7570 | 1.16214368389315 |
| waEthUSDT / sUSDf / waEthUSDC 0.001% | balancer-v3-ethereum | 0x4b5f...aaa6 | 1.1495144913417 |
| TERM / waEthUSDC 0.3% | balancer-v3-ethereum | 0xb259...9570 | 1.16234422963648 |
| waEthLidowstETH / WBTC / LINK / AAVE / SOL / waEthUSDC 0.3% | balancer-v3-ethereum | 0x8523...4d94 | 4019.898815733 |
| slpUSDC / waEthUSDC 0.04% | balancer-v3-ethereum | 0x2f05...6d50 | 1.1552132686 |
| BOLD / waEthUSDT / USDaf / waEthUSDC 0.3% | balancer-v3-ethereum | 0x38eb...1d6b | 0.9970115826 |
| USD29Y / waEthUSDC 1% | balancer-v3-ethereum | 0x51cd...30fd | 1.1573108266 |
| waEthWETH / WBTC / LINK / XAUt / waEthUSDT / waEthUSDC 0.1% | balancer-v3-ethereum | 0x5834...ad98 | 4940.9032703051 |
| BOLD / waEthUSDC 0.01% | balancer-v3-ethereum | 0x698a...c469 | 1.16031354518838 |
| WBTC / waEthUSDC 3% | balancer-v3-ethereum | 0x4bc3...d1ef | 1.15725281840573 |
| waEthUSDC / cUSDO 0.008% | balancer-v3-ethereum | 0x046d...dfe9 | 1.15754278772419 |
| QQQon / PAXG / waEthUSDC / SPYon 0.3% | balancer-v3-ethereum | 0xf3dc...46b3 | 637.4376627418 |
| atvUSDC / waEthUSDC 0.1% | balancer-v3-ethereum | 0x2d34...dfd6 | 1.1526474682 |
| XAUt / waEthUSDC 0.9% | balancer-v3-ethereum | 0x2232...1a09 | 1.1565720811 |
| waEthLidoWETH / UNI / WBTC / LINK / DAI / MKR / waEthUSDC 0.1% | balancer-v3-ethereum | 0x7dcd...778c | 3964.9375150512 |
| USDC / waEthUSDC 30% | uniswap-v4-ethereum | 0xcab3...d816 | 0.20661233 |
| liUSD-1w / waEthUSDC 0.03% | balancer-v3-ethereum | 0xafc1...4ee6 | 1.1468826235 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.