Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RBN / WETH 1% | uniswap_v3 | 0x9498...d93a | 0.081236975986212 |
RBN / WETH | uniswap_v2 | 0xdb44...c112 | 0.0765730606736251 |
RBN / AEVO 4% | uniswap-v4-ethereum | 0xbd01...9c17 | 0.11089048775452 |
RBN / USDC 0.3% | uniswap_v3 | 0xfe0d...43d2 | 0.114484590187095 |
RBN / USDC 40.2% | uniswap-v4-ethereum | 0x0b48...0a1f | 0.0518553338762903 |
RBN / USDC 41% | uniswap-v4-ethereum | 0xea65...a217 | 0.09945864208 |
RBN / USDC 40.04% | uniswap-v4-ethereum | 0x58a7...6c74 | 0.04875599369 |
RBN / USDC 40% | uniswap-v4-ethereum | 0x772f...bcdf | 0.07864324727 |
RBN / USDC 40.01% | uniswap-v4-ethereum | 0x1004...3b1a | 0.04365293229 |
RBN / USDC 40.02% | uniswap-v4-ethereum | 0x61e0...3eda | 0.05022582378 |
RBN / USDC 40.03% | uniswap-v4-ethereum | 0xbca4...704d | 0.05111676587 |
RBN / AEVO 20.01% | uniswap-v4-ethereum | 0xc6d9...4a06 | 0.11775195280601 |
RBN / USDC 40.05% | uniswap-v4-ethereum | 0x910c...ae35 | 0.0540631285 |
RBN / AEVO 9.89% | uniswap-v4-ethereum | 0xb8e7...0463 | 0.114993163880292 |
RBN / AEVO 9.88% | uniswap-v4-ethereum | 0xe7b2...a673 | 0.115535094159073 |
RBN / AEVO 10.01% | uniswap-v4-ethereum | 0x0fbf...55bc | 0.11837609395533 |
RBN / AEVO 10.04% | uniswap-v4-ethereum | 0xacb8...06a1 | 0.118240965742835 |
RBN / USDC 40.11% | uniswap-v4-ethereum | 0x64db...b02d | 0.05684770084 |
RBN / AEVO 30.01% | uniswap-v4-ethereum | 0xb439...afa2 | 0.115060727986539 |
RBN / USDC 40.1% | uniswap-v4-ethereum | 0x8016...342f | 0.05782170928 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.