Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
pufETH / wstETH | curve | 0xeeda...980d | 3967.76256082934 |
pufETH/wstETH / wstETH / pufETH 0.02% | balancer_ethereum | 0x63e0...3f02 | 2589.4889197729 |
pufETH / WETH | curve | 0x39f5...88e1 | 3946.93954421104 |
pufETH / WETH 0.3% | uniswap_v3 | 0xbdb0...499a | 3970.01909847872 |
pufETH / wstETH | curve | 0xb3c8...06c9 | 4053.33393587046 |
pufETH / ETH 0.25% | uniswap-v4-ethereum | 0x6948...5767 | 2612.9642041417 |
pufETH / WETH | deltaswap-ethereum | 0x338c...e8e2 | 2573.5238649884 |
weETH / pufETH 0.05% | uniswap_v3 | 0x5ffd...89dd | 3800.1731979579 |
pufETH / WETH | uniswap_v2 | 0xe68a...ce68 | 3732.26090891666 |
pufETH / WETH 0.05% | uniswap_v3 | 0xbf7d...def7 | 3196.7139364648 |
pufETH / ETH 0.3% | uniswap-v4-ethereum | 0xb76d...d4b6 | 2177.5802266675 |
pufETH / WETH 1% | uniswap_v3 | 0xc641...e080 | 3020.64993128903 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.