Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
REN / WETH | uniswap_v2 | 0x8bd1...858c | 0.00902871764912616 |
REN / WETH | sushiswap | 0x611c...9bb1 | 0.00911798573335075 |
REN / WETH | defi_swap | 0x29c1...9d6a | 0.00926508247644059 |
REN / WETH 0.3% | sushiswap-v3-ethereum | 0xbf97...a7ed | 0.00994889935140485 |
REN / WETH 0.3% | uniswap_v3 | 0x2dd5...0920 | 0.00901315584830445 |
REN / DAI 1% | uniswap_v3 | 0x6333...69b0 | 0.03005855627 |
REN / WETH 0.29% | balancer_ethereum | 0xec60...9b01 | 0.00873823789008292 |
sil / REN | sushiswap | 0x775c...857b | 0.00858725062561335 |
REN / UNI | uniswap_v2 | 0x5e42...c042 | 0.00871629926812053 |
BAT / WBTC / REN / MATIC / SNX / WETH 0.3% | balancer_ethereum | 0x35c2...55aa | 0.141064107 |
REN / CRO | defi_swap | 0x1c3f...468f | 0.00873325687519148 |
REN / USDC | sushiswap | 0x07d0...edde | 0.008652910645 |
REN / USDC | uniswap_v2 | 0x07f0...7df9 | 0.008065410787 |
REN / WETH | shibaswap | 0x5e14...df7c | 0.0089667629290923 |
REN / LINK | uniswap_v2 | 0xbc4d...1d23 | 0.008943994074 |
REN / DAI | uniswap_v2 | 0x2d0a...b9f7 | 0.01381812609 |
REN / DAI | sushiswap | 0x7234...2d3e | 0.01078033339 |
REN / DAI 0.3% | uniswap_v3 | 0x509e...f831 | 0.07452098653 |
REN / USDT | uniswap_v2 | 0x2851...bfe9 | 0.01559535303 |
REN / WETH 1% | uniswap_v3 | 0x5a33...5cfd | 0.00000000000000000000000000000000000458062264800966 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.