| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| rETH / WETH 0.01% | uniswap_v3 | 0x553e...f823 | 2586.4980356176 |
| osETH / rETH | curve | 0xe080...8a0d | 2578.0774165562 |
| waEthWETH / rETH 0.04% | balancer-v3-ethereum | 0x1ea5...13e3 | 2548.72464111641 |
| rETH / ETH 0.01% | uniswap-v4-ethereum | 0x7094...e0b7 | 2602.0593328624 |
| rETH / WETH | curve | 0x9efe...32af | 2581.5130762896 |
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 2581.53603348373 |
| rETH / WETH 0.05% | uniswap_v3 | 0xa4e0...9613 | 2588.3881150535 |
| rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 2548.3844138633 |
| rock.rETH / rETH 0.01% | balancer-v3-ethereum | 0xbb6f...6bbc | 2544.14471638323 |
| rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 2590.2105170841 |
| waEthWETH / tBTC / rETH / T 0.25% | balancer-v3-ethereum | 0x93bd...95a7 | 2219.0078049032 |
| rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 2547.5839950189 |
| rETH / ETH 0.02% | uniswap-v4-ethereum | 0x9b25...00c8 | 2570.5113912282 |
| rETH / frxETH | curve | 0xe7c6...74d9 | 2567.6409805198 |
| rETH / wstETH | curve | 0x447d...cb08 | 2567.6409805198 |
| rETH / WETH | curve | 0x0f31...4d0f | 2549.8075715819 |
| rETH / WETH 0.3% | uniswap_v3 | 0xf0e0...59b1 | 2432.8639255062 |
| fy-rETH / rETH 1% | uniswap_v3 | 0xeded...6d33 | 3392.396778549 |
| rETH / wstETH | carbon-defi-ethereum | 0xc537...-118 | 2480.2194821551 |
| rETH / wstETH 0.05% | uniswap-v4-ethereum | 0xa068...b9a2 | 2400.8544722103 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.