| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / ETH | fluid-ethereum | 0x0b1a...c9e7 | 3130.88 |
| USDC / ETH | fluid-ethereum | 0x8369...34bf | 3132.38 |
| stETH / ETH | curve | 0xdc24...7022 | 3105.79209224548 |
| weETH / ETH | fluid-ethereum | 0x86f8...99ce | 3134.61 |
| ETH / stETH | curve | 0x21e2...843a | 3105.68802576963 |
| frxETH / ETH | curve | 0xa1f8...e577 | 3104.67537665934 |
| rsETH / ETH | fluid-ethereum | 0x2760...2c67 | 3080.83 |
| ezETH / ETH | fluid-ethereum | 0xdd72...9f59 | 3128.1 |
| OETH / ETH | curve | 0x94b1...13e7 | 3101.50972479354 |
| ETH / aETHc | curve | 0xa96a...3ae2 | 3082.45356838534 |
| ETHx / ETH | curve | 0x59ab...1492 | 3091.05116534913 |
| USDT / ETH | carbon-defi-ethereum | 0xc537...e1-8 | 3136.16 |
| weETHs / ETH | fluid-ethereum | 0x0805...7640 | 3110.43 |
| sETH / ETH | curve | 0xc542...4567 | 3016.0252399999 |
| ETH / wBETH | curve | 0xbfab...85e6 | 3012.02374075051 |
| ETH / aETHb | curve | 0xfb9a...cc87 | 3055.919714300340408187752599337142948161186068349 |
| DAI / ETH | carbon-defi-ethereum | 0xc537...e1-1 | 3178.89 |
| SEI / ETH | carbon-defi-ethereum | 0xc537...1774 | 2806.1 |
| FLUID / ETH | fluid-ethereum | 0xc800...8d9c | 3014.95 |
| ETH / rETH | curve | 0xf944...e7a8 | 2978.6048058782 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.