| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RFD / WETH 1% | uniswap_v3 | 0x6c4c...f321 | 0.00000235675809531271 |
| RFD / WETH | uniswap_v2 | 0x9eb4...2198 | 0.000002161379182 |
| RFD / WETH 0.3% | uniswap_v3 | 0xcd1a...76b2 | 0.00000496841568561926 |
| RFD / N 1% | uniswap_v3 | 0x5121...80c2 | 0.00000235684817339493 |
| RFD / N 1% | uniswap-v4-ethereum | 0xf48d...f326 | 0.000004411646287 |
| RFD / N 0.01% | uniswap-v4-ethereum | 0x3fa5...5672 | 0.000003306487223 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.