Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USR / RLP | curve | 0xc907...2656 | 1.17213926230651 |
RLP / USDC | curve | 0x8e00...d211 | 1.17354372966922 |
RLP / USR 0.05% | uniswap_v3 | 0x02a3...ea96 | 1.11597684012491 |
RLP / USR 0.3% | uniswap-v4-ethereum | 0x85b1...a1c3 | 1.9671614803 |
PAXG / RLP 0.05% | uniswap_v3 | 0xdd6c...1765 | 1.1361730929 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.