Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RBN / USDC 0.3% | uniswap_v3 | 0xfe0d...43d2 | 0.154421335366642 |
RBN / WETH 1% | uniswap_v3 | 0x9498...d93a | 0.162432499277836 |
RBN / WETH | uniswap_v2 | 0xdb44...c112 | 0.161094839814746 |
RBN / USDC 1% | balancer_ethereum | 0xd590...800c | 0.15492575 |
RBN / USDC 1% | uniswap_v3 | 0xd3dc...b54f | 0.1598136571373923243783058396793 |
RBN / WETH | sushiswap | 0x3efd...e10f | 0.1650538812 |
RBN / WETH 0.3% | uniswap_v3 | 0x1b21...e212 | 0.006667522657417626167875115938841975251791096640641168541 |
RBN / ELON 1% | uniswap_v3 | 0xed20...40cf | 1.23869954467933 |
RBN / AEVO 0.3% | uniswap_v3 | 0xa24b...b449 | 0.844648690590163 |
n / RBN 1% | uniswap_v3 | 0x6091...7f66 | 0.264736300094855 |
RBN / AEVO 1% | uniswap_v3 | 0x7b32...5e80 | 0.820336002839357 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.