| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RAI / WETH | uniswap_v2 | 0x8ae7...a3b1 | 3.2274993733 |
| RAI / 3Crv | curve | 0x6187...2c7d | 3.1925739076 |
| RAI / WETH 0.3% | uniswap_v3 | 0x14de...3813 | 3.2247462588 |
| RAI / DAI 0.05% | uniswap-v4-ethereum | 0x120d...e5fa | 3.0207813514 |
| RAI / ETH | bunni-ethereum | 0xbc69...f74a | 5.0592553518 |
| RAI / USDC 0.05% | uniswap_v3 | 0xfa7d...c118 | 3.191435462 |
| RAI / DAI 0.05% | uniswap_v3 | 0xcb0c...e19d | 3.4950116475 |
| RAI / USDC 0.3% | uniswap_v3 | 0x209b...9784 | 0.807171963408033 |
| PETAL / RAI | curve | 0x29b2...ae32 | 3.3391686102 |
| RAI / FOLD 1% | uniswap_v3 | 0x8921...b946 | 3.03464813945178 |
| RAI / WETH 0.05% | uniswap_v3 | 0x0dc9...3ab6 | 3.6240217187 |
| RAI / LUSD 0.01% | uniswap_v3 | 0x37de...5c9f | 2.83118311820686452562631936778 |
| RAI / DC 0.3% | uniswap_v3 | 0x0b96...219c | 2.87556421657569 |
| RAI / DAI | uniswap_v2 | 0x4a0e...d757 | 3.4615049621 |
| RAI / LUSD | curve | 0xc58f...3ff6 | 3.2582712315 |
| RAI / FLX / rETH / WETH / RPL 10% | balancer_ethereum | 0xb721...b796 | 3.3822353389 |
| RAI / FRAX 0.05% | uniswap_v3 | 0x5b66...b5c2 | 2.9838876244 |
| RAI / USDC | curve | 0x96a3...e1c2 | 3.1544712942 |
| RAI / FRAX 0.3% | uniswap_v3 | 0xd3f3...986a | 3.04264809957158 |
| RAI / TAI 0.3% | uniswap_v3 | 0x2666...3b02 | 2.76693576953213 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.