Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RAI / WETH | uniswap_v2 | 0x8ae7...a3b1 | 3.07321854464399 |
RAI / DAI 0.05% | uniswap_v3 | 0xcb0c...e19d | 3.06991334975336 |
RAI / 3Crv | curve | 0x6187...2c7d | 3.07701449828943 |
RAI / WETH 0.05% | uniswap_v3 | 0x0dc9...3ab6 | 3.07377358383777 |
RAI / WETH 0.3% | uniswap_v3 | 0x14de...3813 | 3.07713189625569 |
RAI / USDC 0.05% | uniswap_v3 | 0xfa7d...c118 | 3.07047799201227 |
RAI / DAI 0.05% | uniswap-v4-ethereum | 0x120d...e5fa | 3.0207813514 |
RAI / FRAX 0.05% | uniswap_v3 | 0x5b66...b5c2 | 2.9838876244 |
RAI / USDC 0.3% | uniswap_v3 | 0x209b...9784 | 0.807171963408033 |
PETAL / RAI | curve | 0x29b2...ae32 | 2.80468607735894480235640023573 |
RAI / FOLD 1% | uniswap_v3 | 0x8921...b946 | 3.03464813945178 |
RAI / LUSD 0.01% | uniswap_v3 | 0x37de...5c9f | 2.83118311820686452562631936778 |
RAI / DC 0.3% | uniswap_v3 | 0x0b96...219c | 2.87556421657569 |
RAI / FLX / rETH / WETH / RPL 10% | balancer_ethereum | 0xb721...b796 | 3.3066257203 |
RAI / DAI | uniswap_v2 | 0x4a0e...d757 | 2.9833553389 |
RAI / LUSD | curve | 0xc58f...3ff6 | 2.8586662845468140837038760525 |
RAI / FRAX 0.3% | uniswap_v3 | 0xd3f3...986a | 3.04264809957158 |
RAI / TAI 0.3% | uniswap_v3 | 0x2666...3b02 | 2.76693576953213 |
RAI / LUSD | curve | 0x167d...cc4e | 2.84729358109639563020019979353 |
RAI / agEUR | curve | 0xb6d9...0956 | 2.81991722701422052578214633052 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.