| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| aETHc / WETH | uniswap_v2 | 0x6147...d0e5 | 2351.91934051605 |
| aETHc / USDT | sushiswap | 0x2ee5...2a29 | 2851.68586399519 |
| vETH2 / WETH / aETHc / CRETH2 | curve | 0x16be...8192 | 1336.09551201021 |
| bb-a-WETH / aETHc / ankrETH-bb-a-WETH-BPT 0.04% | balancer_ethereum | 0xeb56...769d | 2096.25369167164 |
| ETH / aETHc | curve | 0xa96a...3ae2 | 2421.13430117512 |
| ANKR / aETHc 0.25% | balancer_ethereum | 0x9145...0ef8 | 2895.23761524175 |
| aETHc / onETH | uniswap_v2 | 0x5bd4...1a74 | 3298.6115117762 |
| aETHc / WETH 0.3% | uniswap_v3 | 0xff97...804e | 2441.69731625085 |
| aETHc / frxETH | curve | 0x41ea...f559 | 2419.51406121194 |
| InankrETH / aETHc | curve | 0x68e2...0d3e | 4050.37421326308 |
| aETHc / ETH 40% | uniswap-v4-ethereum | 0x6efe...856f | 1618.1501391598 |
| ONS / aETHc | uniswap_v2 | 0x5022...9b18 | 3302.7156935974 |
| aETHc / WETH 0.04% | balancer_ethereum | 0x8a34...c300 | 2445.00907212663 |
| rETH / DAI / rETH / aETHc 1% | balancer_ethereum | 0xf767...7e37 | 2691.6810223741 |
| aETHc / WETH 0.05% | pancakeswap-v3-ethereum | 0x6635...5274 | 3275.8877148286 |
| aETHc / WETH | sushiswap | 0xfa5b...df5f | 3307.1610828701 |
| ANKR / aETHc | sushiswap | 0xe558...d5ba | 2687.5933015019 |
| ANKR / aETHc 0.3% | uniswap_v3 | 0x1fee...b07b | 2899.46880942518 |
| wstETH / aETHc 0.01% | uniswap_v3 | 0xd9b2...b6cd | 2327.4008280901 |
| ANKR / aETHc | pancakeswap_ethereum | 0x38e0...77ae | 3049.53971905723 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.