| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| stETH / ETH | curve | 0xdc24...7022 | 2287.485948781797911783097168826131423551220859499 |
| USDC / ETH | fluid-ethereum | 0x8369...34bf | 2285.98 |
| ETH / stETH | curve | 0x21e2...843a | 2287.4859487818 |
| ETHx / ETH | curve | 0x59ab...1492 | 2286.207950286836161388001112277417130112532271882 |
| ezETH / ETH | fluid-ethereum | 0xdd72...9f59 | 2275.35 |
| frxETH / ETH | curve | 0xa1f8...e577 | 2271.48660275622 |
| OETH / ETH | curve | 0x94b1...13e7 | 2267.552676337619530781891888541567783278824349489 |
| sETH / ETH | curve | 0xc542...4567 | 2279.236215249043168742665091422286821497086932991 |
| CHEX / ETH | carbon-defi-ethereum | 0xc537...-234 | 3123.44 |
| USDT / ETH | carbon-defi-ethereum | 0xc537...e1-8 | 1919.85 |
| DAI / ETH | carbon-defi-ethereum | 0xc537...e1-1 | 3089.71 |
| wstETH / ETH | fluid-ethereum | 0x0b1a...c9e7 | 2389.69 |
| FOG / ETH | carbon-defi-ethereum | 0xc537...-535 | 2093.16 |
| SEI / ETH | carbon-defi-ethereum | 0xc537...1774 | 2806.1 |
| weETH / ETH | fluid-ethereum | 0x86f8...99ce | 2400.98 |
| osETH / ETH | fluid-ethereum | 0xc065...b8e1 | 2311.11 |
| rsETH / ETH | fluid-ethereum | 0x2760...2c67 | 2349.41 |
| FLUID / ETH | fluid-ethereum | 0xc800...8d9c | 2315.55 |
| weETHs / ETH | fluid-ethereum | 0x0805...7640 | 2350.97 |
| BIFI / ETH | carbon-defi-ethereum | 0xc537...2361 | 2314.4924829548 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.