| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| REN / WETH | uniswap_v2 | 0x8bd1...858c | 0.00581018584752536 |
| REN / WETH | sushiswap | 0x611c...9bb1 | 0.00580561332768585 |
| REN / WETH 0.3% | uniswap_v3 | 0x2dd5...0920 | 0.00570942481982492 |
| REN / WETH 0.29% | balancer_ethereum | 0xec60...9b01 | 0.00574476680799782 |
| REN / WETH | defi_swap | 0x29c1...9d6a | 0.00571260839150692 |
| REN / WETH 0.3% | sushiswap-v3-ethereum | 0xbf97...a7ed | 0.00574276001444277 |
| REN / UNI | uniswap_v2 | 0x5e42...c042 | 0.00550113226600267 |
| BAT / WBTC / REN / MATIC / SNX / WETH 0.3% | balancer_ethereum | 0x35c2...55aa | 0.2518190408 |
| REN / CRO | defi_swap | 0x1c3f...468f | 0.00574661609522396 |
| sil / REN | sushiswap | 0x775c...857b | 0.00577305143802895 |
| REN / USDC | uniswap_v2 | 0x07f0...7df9 | 0.00579191910657783 |
| REN / WETH | shibaswap | 0x5e14...df7c | 0.00569815148794336 |
| REN / DAI 1% | uniswap_v3 | 0x6333...69b0 | 0.0306725481 |
| REN / ETH 0.3% | uniswap-v4-ethereum | 0xb9be...7144 | 0.008169884192 |
| REN / USDC | sushiswap | 0x07d0...edde | 0.005873014565 |
| REN / LINK | uniswap_v2 | 0xbc4d...1d23 | 0.005871923285 |
| REN / DAI | uniswap_v2 | 0x2d0a...b9f7 | 0.006121008272 |
| REN / DAI | sushiswap | 0x7234...2d3e | 0.00579692208 |
| REN / DAI 0.3% | uniswap_v3 | 0x509e...f831 | 0.07452098653 |
| REN / USDT | uniswap_v2 | 0x2851...bfe9 | 0.008052262108 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.