Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 2645.74889971374 |
rETH / WETH 0.04% | balancer_ethereum | 0x1e19...0276 | 2909.59940432566 |
rETH / WETH 0.01% | uniswap_v3 | 0x553e...f823 | 2936.36967901775 |
weETH/rETH / rETH / weETH 0.01% | balancer_ethereum | 0x05ff...da0a | 2888.14333462054 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 3293.36346301387 |
rETH / WETH | curve | 0x9efe...32af | 2888.47102172691 |
osETH / rETH | curve | 0xe080...8a0d | 2886.9783913922 |
rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 2935.38428320702 |
rETH / WETH 0.05% | uniswap_v3 | 0xa4e0...9613 | 2898.31651470652 |
rETH / WETH | curve | 0x0f31...4d0f | 2897.95967985171 |
rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 2917.50158783996 |
rETH / WETH 0.05% | pancakeswap-v3-ethereum | 0x2201...e7bd | 2907.39609902577 |
rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 2916.10559283208 |
rETH / ETH 0.05% | uniswap-v4-ethereum | 0xe8cd...0d23 | 2910.14784206813 |
fy-rETH / rETH 1% | uniswap_v3 | 0xeded...6d33 | 2889.98490461327 |
BADGER / rETH 0.25% | balancer_ethereum | 0x1ee4...a0ff | 2896.15701091082 |
wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 2814.5124670706 |
rETH / frxETH | curve | 0xe7c6...74d9 | 2864.2569214026 |
rETH / wstETH | curve | 0x447d...cb08 | 2831.5124998081 |
rETH / ETH 0.01% | uniswap-v4-ethereum | 0x7094...e0b7 | 2920.08118880958 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.