| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| swETH / WETH 0.3% | uniswap_v3 | 0x4ac5...1565 | 3573.47905305253 |
| swETH / wstETH 0.3% | uniswap-v4-ethereum | 0xe7c7...48d8 | 3381.60261501109 |
| swETH / WETH 0.05% | uniswap_v3 | 0x30ea...49a2 | 3391.8651482763 |
| swETH / ETH 0.05% | uniswap-v4-ethereum | 0x7039...35f6 | 3393.61098604003 |
| swETH / WETH 0.05% | pancakeswap-v3-ethereum | 0x6db0...8c14 | 3392.84136308993 |
| swETH / frxETH | curve | 0x67e0...b767 | 3360.35637451182 |
| wstETH / swETH 0.01% | balancer_ethereum | 0x127e...ea85 | 3392.00196830085 |
| wstETH / swETH 0.01% | balancer_ethereum | 0xe0e8...7afb | 3393.11563958396 |
| swETH / WETH 0.01% | uniswap_v3 | 0xcbdf...ef84 | 3381.63880280832 |
| swETH / rswETH 0.05% | uniswap-v4-ethereum | 0xb3d3...a4f0 | 3418.18185564356 |
| GRAI / swETH 0.3% | uniswap_v3 | 0x00e8...ac66 | 3464.0177441354 |
| mswETH / swETH 0.01% | pancakeswap-v3-ethereum | 0x6177...e948 | 2690.31967347456 |
| mswETH / swETH | curve | 0x2022...cf00 | 3730.2731273591 |
| InswETH / swETH | curve | 0x51fd...3887 | 4951.9786438396 |
| swETH / WETH | sushiswap | 0x7119...770b | 3161.9998854978 |
| swETH / ETH 0.01% | uniswap-v4-ethereum | 0x7b93...9ce5 | 3913.3966474046 |
| swETH / ETH 0.15% | uniswap-v4-ethereum | 0x2315...5c62 | 4564.1226830545 |
| swETH / USDC 0.05% | uniswap_v3 | 0x7a97...8ace | 1657.23440321205 |
| USDC / swETH | deltaswap-ethereum | 0xdc80...4198 | 3551.6651018046 |
| swETH / WETH | uniswap_v2 | 0x8d30...bef3 | 4035.1696790607 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.