| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| osETH / rETH | curve | 0xe080...8a0d | 3943.90681466383 |
| rETH / WETH 0.04% | balancer_ethereum | 0x1e19...0276 | 3950.34855602224 |
| rETH / WETH 0.01% | uniswap_v3 | 0x553e...f823 | 3957.06515405195 |
| rETH / ETH 0.02% | uniswap-v4-ethereum | 0x9b25...00c8 | 3974.47337368723 |
| rETH / WETH | curve | 0x9efe...32af | 3949.3927578782 |
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 3929.02130608901 |
| rETH / WETH 0.05% | uniswap_v3 | 0xa4e0...9613 | 3985.56450861631 |
| rETH / WETH | curve | 0x0f31...4d0f | 3951.04377896794 |
| rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 3962.77465240161 |
| rETH / wstETH | curve | 0x447d...cb08 | 3931.66423273112 |
| rETH / frxETH | curve | 0xe7c6...74d9 | 3928.57292744531 |
| rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 3957.01437252951 |
| rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 3982.6572692729 |
| rETH / ETH 0.05% | uniswap-v4-ethereum | 0xe8cd...0d23 | 3989.12109844125 |
| rETH / WETH 0.05% | pancakeswap-v3-ethereum | 0x2201...e7bd | 3677.62334181954 |
| weETH/rETH / rETH / weETH 0.01% | balancer_ethereum | 0x05ff...da0a | 4168.63503148883 |
| USDC / rETH 0.3% | uniswap-v4-ethereum | 0xfe34...1b76 | 3971.95309538499 |
| rETH / WETH 0.3% | uniswap_v3 | 0xf0e0...59b1 | 3936.6777567968 |
| rETH / WBTC 0.3% | uniswap-v4-ethereum | 0xa8b7...1b53 | 3984.131895268 |
| rETH / RZR 1% | balancer-v3-ethereum | 0x3c2d...b570 | 3954.12146260331 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.