| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| REN / WETH | uniswap_v2 | 0x8bd1...858c | 0.00598435600163276 |
| REN / WETH | sushiswap | 0x611c...9bb1 | 0.00598942831513477 |
| REN / WETH | defi_swap | 0x29c1...9d6a | 0.006065278090327 |
| REN / WETH 0.29% | balancer_ethereum | 0xec60...9b01 | 0.00607717304261614 |
| REN / WETH 0.3% | uniswap_v3 | 0x2dd5...0920 | 0.0061805209425871 |
| REN / WETH 0.3% | sushiswap-v3-ethereum | 0xbf97...a7ed | 0.00606467314522813 |
| REN / UNI | uniswap_v2 | 0x5e42...c042 | 0.00609621266588653 |
| sil / REN | sushiswap | 0x775c...857b | 0.00608770793762362 |
| BAT / WBTC / REN / MATIC / SNX / WETH 0.3% | balancer_ethereum | 0x35c2...55aa | 0.251819040753196 |
| REN / USDC | sushiswap | 0x07d0...edde | 0.00619988266954835 |
| REN / USDC | uniswap_v2 | 0x07f0...7df9 | 0.00612350923868221 |
| REN / WETH | shibaswap | 0x5e14...df7c | 0.0062951727136126 |
| REN / LINK | uniswap_v2 | 0xbc4d...1d23 | 0.00633896761754579 |
| REN / DAI 1% | uniswap_v3 | 0x6333...69b0 | 0.0306725481 |
| REN / CRO | defi_swap | 0x1c3f...468f | 0.00625750701095288 |
| REN / ETH 0.3% | uniswap-v4-ethereum | 0xb9be...7144 | 0.008169884192 |
| REN / DAI | sushiswap | 0x7234...2d3e | 0.007461745343 |
| REN / DAI | uniswap_v2 | 0x2d0a...b9f7 | 0.00548440552 |
| REN / DAI 0.3% | uniswap_v3 | 0x509e...f831 | 0.07452098653 |
| REN / USDT | uniswap_v2 | 0x2851...bfe9 | 0.00438987448 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.