Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
osETH / rETH | curve | 0xe080...8a0d | 4722.19296024755 |
rETH / WETH 0.04% | balancer_ethereum | 0x1e19...0276 | 4748.55788528947 |
rETH / ETH 0.02% | uniswap-v4-ethereum | 0x9b25...00c8 | 4713.67438080676 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01% | balancer_ethereum | 0x42ed...0af7 | 4658.229105114 |
weETH/rETH / rETH / weETH 0.01% | balancer_ethereum | 0x05ff...da0a | 4695.84358318944 |
rETH / WETH 0.01% | uniswap_v3 | 0x553e...f823 | 4721.67484085785 |
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02% | balancer_ethereum | 0x5aee...cabe | 3293.36346301387 |
rETH / WETH | curve | 0x9efe...32af | 4713.166376013773515704139041818638382055257609045566062890246008 |
rETH / WETH 0.05% | uniswap_v3 | 0xa4e0...9613 | 4754.9655559555 |
rETH / frxETH | curve | 0xe7c6...74d9 | 4688.9605429964550223439317508470700151290254301638599565451901 |
wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 4684.73319423336 |
rETH / WETH | curve | 0x0f31...4d0f | 4687.35997759278 |
rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 4686.35015558164 |
rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 4723.66284639092 |
rETH / RZR 1% | balancer-v3-ethereum | 0x3c2d...b570 | 4703.91400039249 |
rock.rETH / rETH 0.01% | balancer-v3-ethereum | 0xbb6f...6bbc | 4723.34723002578 |
rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 4716.09728155486 |
rETH / WBTC 0.3% | uniswap-v4-ethereum | 0xa8b7...1b53 | 4780.46374080112 |
USDC / rETH 0.3% | uniswap-v4-ethereum | 0xfe34...1b76 | 4745.01538968752 |
rETH / ETH 0.05% | uniswap-v4-ethereum | 0xe8cd...0d23 | 4789.93415319144 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.