| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RFDELTA / WBTC 0.3% | uniswap-v4-ethereum | 0x6989...0d8e | 153.7625744884 |
| RFDELTA / WETH 1% | uniswap_v3 | 0xfd4c...f705 | 58.792708543 |
| KITE / RFDELTA 1% | uniswap_v3 | 0x68c6...cc41 | 54.785040891 |
| RFDELTA / USDC 1% | uniswap_v3 | 0x4dd8...3338 | 81.9572218967 |
| KITE / RFDELTA 1% | uniswap-v4-ethereum | 0x7ef9...850c | 90.9897752768 |
| RFDELTA / SPX 1% | uniswap-v4-ethereum | 0xf9e6...0c73 | 104.0042862913 |
| RFDELTA / ETH 1% | uniswap-v4-ethereum | 0xdb90...9fb6 | 78.8082709976 |
| RFDELTA / USDT 1% | uniswap-v4-ethereum | 0x8367...7258 | 73.1212986253 |
| CPOOL / RFDELTA 1% | uniswap-v4-ethereum | 0x1565...0556 | 66.3993312738 |
| RFDELTA / USDC 0.3% | uniswap-v4-ethereum | 0x08c4...0624 | 17.3097180397 |
| PEPE / RFDELTA 1% | uniswap_v3 | 0x7b02...d789 | 54.7472766089 |
| RFDELTA / USDC 0.3% | uniswap_v3 | 0x042d...59fc | 83.893650334 |
| CPOOL / RFDELTA 1% | uniswap_v3 | 0xd9c7...6865 | 77.0059303757 |
| RFDELTA / SPX 0.3% | uniswap_v3 | 0xc4b9...2ccf | 69.2391232509 |
| RFDELTA / CRO 1% | uniswap_v3 | 0x695e...5ab4 | 73.8224158778 |
| RFDELTA / SPX 1% | uniswap_v3 | 0x77f6...9b55 | 80.7702063371 |
| RFDELTA / cbETH | uniswap_v2 | 0xd3af...460d | 76.6017533811 |
| LsETH / RFDELTA 1% | uniswap_v3 | 0xf9f6...78d4 | 151.5606885023 |
| PENGU / RFDELTA 1% | uniswap_v3 | 0x7a44...5ad8 | 74.3910120024 |
| RFDELTA / UNI 1% | uniswap_v3 | 0xa09c...a0b5 | 79.3207890289 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.