| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0xbd78...4fec | 0.003964379754 |
| RALLY / USDC 2% | uniswap-v4-ethereum | 0x64bb...cb0d | 0.003839663036 |
| RALLY / ETH 1% | uniswap-v4-ethereum | 0xda9a...a115 | 0.003916126671 |
| RALLY / ETH 0.3% | uniswap-v4-ethereum | 0x2b83...854e | 0.00393191925 |
| INDXL / RALLY 1% | uniswap-v4-ethereum | 0x85b4...3c39 | 0.00390228109115289 |
| RALLY / ETH 0.3% | uniswap-v4-ethereum | 0xb0e9...b60f | 0.004131613432 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0xd695...6a20 | 0.004328213249 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0x9429...8f28 | 0.002646346751 |
| RALLY / ETH 0.3% | uniswap-v4-ethereum | 0xe0ad...e968 | 0.001798201013 |
| INDXL / RALLY 10% | uniswap-v4-ethereum | 0x2bf2...8fde | 0.00481033450909462 |
| RALLY / USDT 2% | uniswap-v4-ethereum | 0xa1d4...ae90 | 0.003682864803 |
| RALLY / USDC 10% | uniswap-v4-ethereum | 0x2a4e...f64c | 0.002959440376 |
| GROW / RALLY 0.3% | uniswap-v4-ethereum | 0x02a2...6789 | 0.00171056215 |
| GROW / RALLY 0.3% | uniswap-v4-ethereum | 0x8e72...db7f | 0.002147889352 |
| RALLY / ELMT 0.3% | uniswap-v4-ethereum | 0x0f7e...35f0 | 0.002057963927 |
| RALLY / USDC 1% | uniswap-v4-ethereum | 0x78d3...34f6 | 0.003060793963 |
| RALLY / ELMT 0.3% | uniswap-v4-ethereum | 0x0e44...73cc | 0.002066037673 |
| RALLY / REV 0.3% | uniswap-v4-ethereum | 0x7143...5154 | 0.001695304761 |
| RALLY / SWITCH 0.3% | uniswap-v4-ethereum | 0x5338...630c | 0.002088097448 |
| RALLY / SWITCH 0.3% | uniswap-v4-ethereum | 0xf1a0...ce41 | 0.001916212284 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.