| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| rETH / WETH 0.01% | uniswap_v3 | 0x553e...f823 | 3416.08869361424 |
| osETH / rETH | curve | 0xe080...8a0d | 3375.181960158 |
| waEthWETH / rETH 0.04% | balancer-v3-ethereum | 0x1ea5...13e3 | 3431.96755415578 |
| rETH / ETH 0.02% | uniswap-v4-ethereum | 0x9b25...00c8 | 3414.76959330911 |
| rETH / WETH | curve | 0x9efe...32af | 3414.64254630029 |
| wstETH / rETH / sfrxETH | curve | 0x2570...7193 | 3407.52455404245 |
| rETH / frxETH | curve | 0xe7c6...74d9 | 3379.35254235728 |
| rETH / WETH 0.05% | uniswap_v3 | 0xa4e0...9613 | 3411.92845366061 |
| rETH / wstETH 0.02% | uniswap-v4-ethereum | 0xcfe7...90a8 | 3403.60291530997 |
| rETH / wstETH | curve | 0x447d...cb08 | 3374.50392481992 |
| rETH / WETH | curve | 0x0f31...4d0f | 3419.86393456713 |
| rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 3414.73673117309 |
| rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 3415.30037686308 |
| rETH / ETH 0.05% | uniswap-v4-ethereum | 0xe8cd...0d23 | 3438.39979109744 |
| USDC / rETH 0.3% | uniswap-v4-ethereum | 0xfe34...1b76 | 3398.12769102097 |
| rETH / WETH 0.3% | uniswap_v3 | 0xf0e0...59b1 | 3439.54432599444 |
| rETH / WBTC 0.3% | uniswap-v4-ethereum | 0xa8b7...1b53 | 3409.77957065864 |
| rETH / crvUSD | curve | 0x660a...c82b | 3369.68518763843 |
| rETH / RPL 0.25% | balancer_ethereum | 0x0fd5...0b8b | 3427.7312374964 |
| rETH / RZR 1% | sushiswap-v3-ethereum | 0x97f9...8289 | 3448.93099565 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.