| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RLP / USDC | curve | 0x8e00...d211 | 0.4265267153 |
| USR / RLP | curve | 0xc907...2656 | 0.423441657031072 |
| wstUSR / RLP | curve | 0x42cf...0889 | 0.426568403134028 |
| RLP / USR 0.05% | uniswap_v3 | 0x02a3...ea96 | 0.4241925907 |
| RLP / GYD 0.05% | balancer_ethereum | 0xbeb2...2bd7 | 1.2342118455 |
| RLP / USDC | fluid-ethereum | 0x50fa...1d4c | 1.2797654121 |
| RLP / USDC 0.07% | uniswap-v4-ethereum | 0x8d00...b41f | 1.28018313 |
| RLP / USDC 0.05% | uniswap-v4-ethereum | 0x9e30...8396 | 1.1790375666 |
| RLP / USDC 0.04% | uniswap-v4-ethereum | 0xb37e...3621 | 1.2807074002 |
| RLP / USDC 0.1% | uniswap-v4-ethereum | 0x5337...dc5d | 1.2813528395 |
| RLP / ETH 88% | uniswap-v4-ethereum | 0xfa94...7f28 | 1.1019506932 |
| RLP / USDC 99% | uniswap-v4-ethereum | 0x82c5...6139 | 0.1247791626 |
| RLP / USDC 86% | uniswap-v4-ethereum | 0x83f5...04c9 | 0.2020913088 |
| RLP / USDC 99.1% | uniswap-v4-ethereum | 0x600c...74a4 | 0.1607532752 |
| RLP / USDC 89% | uniswap-v4-ethereum | 0x0afd...bd08 | 0.2034001523 |
| RLP / USDT 70.01% | uniswap-v4-ethereum | 0xb370...e2cf | 0.1231776755 |
| RLP / USDC 99.02% | uniswap-v4-ethereum | 0x42d6...279d | 0.1343842827 |
| RLP / USDC 0.07% | uniswap-v4-ethereum | 0x1e7f...88a3 | 1.2827044559 |
| RLP / USDC 93% | uniswap-v4-ethereum | 0x5971...50be | 0.1955220818 |
| RLP / USDC 0.069% | uniswap-v4-ethereum | 0xcdd7...add8 | 1.2828939545 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.