| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| REZ / USDC 1% | uniswap-v4-ethereum | 0xe7e6...baef | 0.00463531184319769 |
| REZ / KABOSU | uniswap_v2 | 0x1320...d708 | 0.00468438152751849 |
| REZ / ezREZ 0.3% | uniswap-v4-ethereum | 0x35b6...6802 | 0.00479933658139313 |
| REZ / WETH 1% | uniswap_v3 | 0x7636...ae00 | 0.006222807981 |
| REZ / WETH 0.3% | uniswap_v3 | 0x59c6...62c5 | 0.0531680025 |
| REZ / ezETH 0.3% | uniswap-v4-ethereum | 0x950d...6cfd | 0.01575457072 |
| REZ / USDC 1% | uniswap_v3 | 0x4385...24d5 | 0.01259484663 |
| ezREZ / REZ 0.05% | uniswap_v3 | 0x22f0...a03e | 0.009197647622 |
| REZ / USDC 0.3% | uniswap-v4-ethereum | 0xa08a...e94c | 0.004837530013 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.