| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| rsETH / ETH | fluid-ethereum | 0x2760...2c67 | 2221.1386027721 |
| wstETH / rsETH 0.05% | uniswap_v3 | 0x7a27...2eee | 2207.47443449539 |
| rsETH / wstETH 0.047% | uniswap-v4-ethereum | 0xbbcc...56bb | 2266.1763247953 |
| rsETH / WETH 0.01% | uniswap_v3 | 0x48f9...b2e2 | 2208.8626928547 |
| rsETH / hgETH 0.04% | balancer-v3-ethereum | 0x6649...55cf | 2261.0600111862 |
| weETH / rsETH | curve | 0x6683...cedd | 2202.57701436297 |
| rsETH / wstETH 0.048% | uniswap-v4-ethereum | 0x1b9b...5233 | 2316.990875561 |
| KEP / rsETH 1% | balancer_ethereum | 0xff42...4909 | 2676.86035099517 |
| rsETH / ETH 0.03% | uniswap-v4-ethereum | 0x9690...1b6b | 2210.4233448952 |
| sfrxETH / rsETH | curve | 0x3772...5810 | 2321.4267707559 |
| rsETH / ETH 80% | uniswap-v4-ethereum | 0x3be6...a910 | 393.0889638658 |
| rsETH / agETH / agETH / rsETH 0.04% | balancer_ethereum | 0xf1bb...0eb0 | 4574.1822508084 |
| ylrsETH / rsETH | uniswap_v2 | 0x761c...8a13 | 3180.2677242027 |
| rsETH / ETHx 0.3% | uniswap_v3 | 0x6493...5485 | 2180.2095912814 |
| rsETH / WETH 0.05% | uniswap_v3 | 0x0596...e1d3 | 2474.2064308855 |
| rsETH / USDT 88% | uniswap-v4-ethereum | 0x59d4...6568 | 396.2761149086 |
| rsETH / WETH 1% | uniswap_v3 | 0xed33...9dad | 2700.88874066728 |
| rsETH / rsETH / WETH / WETH 0.001% | balancer_ethereum | 0x58aa...6b6d | 3942.4121633701 |
| rsETH / WETH 0.3% | uniswap_v3 | 0xcb9a...c5f3 | 2555.69452698136 |
| KEP / rsETH 1% | uniswap_v3 | 0xfa54...5904 | 3393.34768391549 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.