| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RLP / USDC | fluid-ethereum | 0x50fa...1d4c | 1.27760309387306 |
| USR / RLP | curve | 0xc907...2656 | 1.24371452332679 |
| wstUSR / RLP 0.05% | balancer-v3-ethereum | 0x9481...1086 | 1.2724971012328 |
| RLP / USDC | curve | 0x8e00...d211 | 1.26890293520592 |
| wstUSR / RLP | curve | 0x42cf...0889 | 1.24263306552731 |
| RLP / USDC 87% | uniswap-v4-ethereum | 0x0116...78a1 | 0.270368913589931 |
| RLP / USR 0.05% | uniswap_v3 | 0x02a3...ea96 | 1.24323899705826 |
| RLP / USDT 70% | uniswap-v4-ethereum | 0x9bfc...b35e | 0.154974241528948 |
| RLP / USDC 88% | uniswap-v4-ethereum | 0x756f...1365 | 0.133006711130421 |
| RLP / GYD 0.05% | balancer_ethereum | 0xbeb2...2bd7 | 1.2342118455 |
| RLP / USDC 0.05% | uniswap-v4-ethereum | 0x9e30...8396 | 1.1790375666 |
| RLP / USDC 0.015% | uniswap-v4-ethereum | 0x6e34...c4e3 | 1.2159538009 |
| RLP / USDC 0.02% | uniswap-v4-ethereum | 0x361b...48f2 | 1.2206705084 |
| RLP / USDC 0.049% | uniswap-v4-ethereum | 0xa3e5...b124 | 1.2001724896 |
| RLP / USDC 0.019% | uniswap-v4-ethereum | 0x13b5...ff06 | 1.2210785826 |
| RLP / USDC 0.075% | uniswap-v4-ethereum | 0xa2a1...9a5f | 1.253868571 |
| RLP / USDC 0.02% | uniswap-v4-ethereum | 0xa80a...9978 | 1.2088414069 |
| RLP / USR 0.3% | uniswap-v4-ethereum | 0x85b1...a1c3 | 1.2172496284 |
| RLP / USDC 0.005% | uniswap-v4-ethereum | 0x0105...30f1 | 1.2058729548 |
| RLP / USDC 0.3% | uniswap_v3 | 0x0003...431f | 1.2350454826 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.