| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| pufETH / wstETH | curve | 0xeeda...980d | 3098.1412132015 |
| pufETH / WETH | curve | 0x39f5...88e1 | 3090.96427410896 |
| pufETH / WETH 0.3% | uniswap_v3 | 0xbdb0...499a | 3089.81830135036 |
| pufETH / wstETH | curve | 0xb3c8...06c9 | 3091.62303569591 |
| pufETH / WETH | uniswap_v2 | 0xe68a...ce68 | 1114.29299829082 |
| pufETH / ETH 0.25% | uniswap-v4-ethereum | 0x6948...5767 | 2612.9642041417 |
| pufETH / WETH | deltaswap-ethereum | 0x338c...e8e2 | 3286.6623420952 |
| pufETH / ETH 0.3% | uniswap-v4-ethereum | 0xb76d...d4b6 | 2177.5802266675 |
| gtWETHe / pufETH 0.01% | balancer-v3-ethereum | 0xe876...c6af | 3183.7768509783 |
| pufETH/wstETH / wstETH / pufETH 0.02% | balancer_ethereum | 0x63e0...3f02 | 0.003451567539 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.