| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RTM / WETH 0.05% | cypher | 0xff7b...49dc | 0.000002728329984 |
| RTM / ETH 29% | uniswap-v4-ethereum | 0x0595...e7ea | 0.00007333320323 |
| RTM / ETH 5% | uniswap-v4-ethereum | 0x7a79...9425 | 0.00001282876191 |
| RTM / ETH 20.1% | uniswap-v4-ethereum | 0xbd11...eb9e | 0.0000400372337 |
| RTM / ETH 50% | uniswap-v4-ethereum | 0xabab...70e5 | 0.00003123521238 |
| RTM / ETH 20% | uniswap-v4-ethereum | 0x98d9...bae0 | 0.000004903815276 |
| RTM / ETH 4.9% | uniswap-v4-ethereum | 0xafc2...f31b | 0.000006776954373 |
| RTM / ETH 5.089% | uniswap-v4-ethereum | 0x94a9...991e | 0.0000387031605 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.