Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
stETH / ETH | curve | 0xdc24...7022 | 1598.14 |
frxETH / ETH | curve | 0xa1f8...e577 | 1596.06 |
OETH / ETH | curve | 0x94b1...13e7 | 1596.68 |
ETH / stETH | curve | 0x21e2...843a | 1616.04 |
ETHx / ETH | curve | 0x59ab...1492 | 1621.15 |
sETH / ETH | curve | 0xc542...4567 | 1611.45 |
ETH / wBETH | curve | 0xbfab...85e6 | 1604.34 |
ETH / aETHc | curve | 0xa96a...3ae2 | 1631.59 |
ETH / rETH | curve | 0xf944...e7a8 | 1602.5 |
SRG / ETH | surge-protocol-eth | 0xcd68...bfde | 3935.6793365599 |
ETH / aETHb | curve | 0xfb9a...cc87 | 2876.62240297043 |
ETH / cbETH | curve | 0x6e8d...f18a | 2596.99898883716 |
ixETH / ETH | curve | 0x2448...e572 | 3097.23016376974 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.