| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ETH+ / eUSD / RSR | curve | 0xdb69...44b4 | 3504.94244376096 |
| RSR / WETH 0.3% | uniswap_v3 | 0x32d9...27b2 | 0.00287955014138549 |
| RSR / crvFRAX | curve | 0x6a62...60b2 | 0.00288544126883736 |
| RSR / ETH 0.3% | uniswap-v4-ethereum | 0x56a1...0dbe | 0.00287789300165574 |
| RSR / WETH | uniswap_v2 | 0x7322...2bdf | 0.00293281764932819 |
| RSR / USDC 1% | uniswap_v3 | 0x167a...5a21 | 0.00285812478582719 |
| RSR / WLFI 0.3% | uniswap-v4-ethereum | 0xde6d...aa69 | 0.00299276841850047 |
| RSR / WETH 0.3% | balancer_ethereum | 0x771f...bc62 | 0.00295711592713486 |
| RSR / WETH 1% | uniswap_v3 | 0xa3a9...f604 | 0.003043251995 |
| RSR / KABOSU | uniswap_v2 | 0x5454...8fbc | 0.002749502393 |
| RSR / CRV 0.3% | uniswap-v4-ethereum | 0xb4bc...5f27 | 0.003231377145 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.