| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RUNE / WETH | sushiswap | 0xcc39...e6da | 0.0470580216002835 |
| RUNE / WETH | uniswap_v2 | 0x8d2a...24c7 | 0.0456581350359338 |
| SOTU / RUNE | uniswap_v2 | 0xb9f8...1ecb | 0.0477390712142292 |
| ALPHA / RUNE | sushiswap | 0x72a6...3b2d | 0.04576741248 |
| RUNE / USDT | sushiswap | 0xd279...5bed | 0.0462494040572786 |
| RUNE / SUSHI | sushiswap | 0x513d...5d89 | 0.05019514702 |
| RUNE / AAVE | sushiswap | 0x5285...27e5 | 0.04382893401 |
| RUNE / YFI | sushiswap | 0xbd68...ad3f | 0.08398715719 |
| CRV / RUNE | sushiswap | 0x4ce1...56f5 | 0.128039224 |
| CREAM / RUNE | sushiswap | 0x886f...7e19 | 0.06126035446 |
| RUNE / HEGIC | sushiswap | 0x38b1...05dd | 0.06042364599 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.