Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
pufETH/wstETH / wstETH / pufETH 0.02% | balancer_ethereum | 0x63e0...3f02 | 2051.9664102228 |
pufETH / WETH | curve | 0x39f5...88e1 | 1893.14708215524 |
pufETH / WETH 0.3% | uniswap_v3 | 0xbdb0...499a | 1885.03863702263 |
pufETH / wstETH | curve | 0xeeda...980d | 1858.35633224877 |
pufETH / WETH | uniswap_v2 | 0xe68a...ce68 | 1762.59305627881 |
pufETH / wstETH | curve | 0xb3c8...06c9 | 2138.3913849509 |
pufETH / WETH | deltaswap-ethereum | 0x338c...e8e2 | 1916.2447537169 |
weETH / pufETH 0.05% | uniswap_v3 | 0x5ffd...89dd | 3800.1731979579 |
pufETH / WETH 0.05% | uniswap_v3 | 0xbf7d...def7 | 3196.7139364648 |
pufETH / ETH 0.3% | uniswap-v4-ethereum | 0xb76d...d4b6 | 2177.5802266675 |
pufETH / WETH 1% | uniswap_v3 | 0xc641...e080 | 3020.64993128903 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.