| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETH / aETHc | curve | 0xa96a...3ae2 | 2647.28209086388 |
| aETHc / WETH | uniswap_v2 | 0x6147...d0e5 | 2727.3108576371 |
| ANKR / aETHc | sushiswap | 0xe558...d5ba | 2741.6635886215 |
| vETH2 / WETH / aETHc / CRETH2 | curve | 0x16be...8192 | 1336.09551201021 |
| bb-a-WETH / aETHc / ankrETH-bb-a-WETH-BPT 0.04% | balancer_ethereum | 0xeb56...769d | 2096.25369167164 |
| ANKR / aETHc 0.25% | balancer_ethereum | 0x9145...0ef8 | 2895.23761524175 |
| aETHc / onETH | uniswap_v2 | 0x5bd4...1a74 | 2516.9720486292 |
| aETHc / WETH 0.3% | uniswap_v3 | 0xff97...804e | 2562.9021283908 |
| aETHc / frxETH | curve | 0x41ea...f559 | 2574.8348570039 |
| InankrETH / aETHc | curve | 0x68e2...0d3e | 4050.37421326308 |
| aETHc / ETH 40% | uniswap-v4-ethereum | 0x6efe...856f | 1618.1501391598 |
| ONS / aETHc | uniswap_v2 | 0x5022...9b18 | 3302.7156935974 |
| aETHc / WETH 0.04% | balancer_ethereum | 0x8a34...c300 | 2512.407736453 |
| rETH / DAI / rETH / aETHc 1% | balancer_ethereum | 0xf767...7e37 | 3681.988817926 |
| aETHc / WETH 0.05% | pancakeswap-v3-ethereum | 0x6635...5274 | 2392.0007793273 |
| aETHc / WETH | sushiswap | 0xfa5b...df5f | 2587.4096025526 |
| aETHc / USDT | sushiswap | 0x2ee5...2a29 | 2851.6858639952 |
| ANKR / aETHc 0.3% | uniswap_v3 | 0x1fee...b07b | 2899.46880942518 |
| wstETH / aETHc 0.01% | uniswap_v3 | 0xd9b2...b6cd | 2327.4008280901 |
| ANKR / aETHc | pancakeswap_ethereum | 0x38e0...77ae | 3049.53971905723 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.