| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| rETH / WETH 0.01% | uniswap_v3 | 0x553e...f823 | 3437.89891218099 |
| osETH / rETH | curve | 0xe080...8a0d | 3433.8796649178083947286092967055815231324319161243438359248105 |
| rETH / WETH | curve | 0x9efe...32af | 3378.84421291828 |
| rETH / ETH 0.02% | uniswap-v4-ethereum | 0x9b25...00c8 | 3439.54256843579 |
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 3392.83697776231 |
| rETH / frxETH | curve | 0xe7c6...74d9 | 3398.54089309626020598844617695672288027063995827038877198708425 |
| rETH / WETH 0.05% | uniswap_v3 | 0xa4e0...9613 | 3438.3986935502 |
| rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 3455.83510549463 |
| rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 3438.63734867571 |
| rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 3438.20356726114 |
| USDC / rETH 0.3% | uniswap-v4-ethereum | 0xfe34...1b76 | 3434.85981284262 |
| rETH / WBTC 0.3% | uniswap-v4-ethereum | 0xa8b7...1b53 | 3458.97233209538 |
| rETH / crvUSD | curve | 0x660a...c82b | 3431.00160021388 |
| rETH / WBTC 0.25% | pancakeswap-v3-ethereum | 0x0d91...358a | 3383.27221516225 |
| wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 2506.7407368555 |
| waEthWETH / rETH 0.04% | balancer-v3-ethereum | 0x1ea5...13e3 | 3387.72981838598 |
| rETH / wstETH | curve | 0x447d...cb08 | 3344.08260393412 |
| rETH / WETH | curve | 0x0f31...4d0f | 3383.884324072576221553410580170403543205847470322689277428930072 |
| rETH / WETH 0.3% | uniswap_v3 | 0xf0e0...59b1 | 3439.5443259944 |
| rock.rETH / rETH 0.01% | balancer-v3-ethereum | 0xbb6f...6bbc | 4685.0277103634 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.