| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETH / rETH | curve | 0xf944...e7a8 | 2250.92381061524 |
| rETH / WETH 0.3% | balancer_ethereum | 0xaecc...e771 | 1621.491142993476032139142789585 |
| rETH / WETH | uniswap_v2 | 0x5f49...18b3 | 2155.4629843747 |
| rETH / DAI / rETH / aETHc 1% | balancer_ethereum | 0xf767...7e37 | 2691.6810223741 |
| rETH / frxETH | curve | 0xfcc0...8e9b | 5063.7785169454 |
| rETH / WETH 0.3% | uniswap_v3 | 0x0425...4ba2 | 1988.52613001672 |
| rETH / WETH 0.05% | uniswap_v3 | 0x2919...2b31 | 2691.21993905043 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.