| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RST / WETH | uniswap_v2 | 0x0f02...d20e | 0.294685832156316 |
| RIO / RST | uniswap_v2 | 0x4502...a81b | 0.295453397553931 |
| RST / rUSD | uniswap_v2 | 0xec3d...794b | 0.275555419 |
| RST / RIO | uniswap_v2 | 0x0bd5...c7e0 | 0.2633676842 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.