| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| REN / WETH | uniswap_v2 | 0x8bd1...858c | 0.00434123417596177 |
| REN / WETH | sushiswap | 0x611c...9bb1 | 0.0043393894327117 |
| REN / WETH | defi_swap | 0x29c1...9d6a | 0.00433126705864417 |
| REN / WETH 0.29% | balancer_ethereum | 0xec60...9b01 | 0.00442168940205104 |
| REN / WETH 0.3% | sushiswap-v3-ethereum | 0xbf97...a7ed | 0.00432206045077283 |
| REN / UNI | uniswap_v2 | 0x5e42...c042 | 0.00450054772636253 |
| sil / REN | sushiswap | 0x775c...857b | 0.00442368622338073 |
| REN / CRO | defi_swap | 0x1c3f...468f | 0.00434466538537529 |
| REN / USDC | sushiswap | 0x07d0...edde | 0.00447043926125406 |
| BAT / WBTC / REN / MATIC / SNX / WETH 0.3% | balancer_ethereum | 0x35c2...55aa | 0.122024677 |
| REN / USDC | uniswap_v2 | 0x07f0...7df9 | 0.00440206111009065 |
| REN / WETH | shibaswap | 0x5e14...df7c | 0.00449719736550464 |
| REN / WETH 0.3% | uniswap_v3 | 0x2dd5...0920 | 0.004512853822 |
| REN / DAI 1% | uniswap_v3 | 0x6333...69b0 | 0.0306725481 |
| REN / ETH 0.3% | uniswap-v4-ethereum | 0xb9be...7144 | 0.008169884192 |
| REN / LINK | uniswap_v2 | 0xbc4d...1d23 | 0.00411537752687929 |
| REN / DAI | uniswap_v2 | 0x2d0a...b9f7 | 0.004745574991 |
| REN / DAI | sushiswap | 0x7234...2d3e | 0.00426573581076592 |
| REN / DAI 0.3% | uniswap_v3 | 0x509e...f831 | 0.07452098653 |
| REN / USDT | uniswap_v2 | 0x2851...bfe9 | 0.004848200565 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.