| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RZR / WETH | uniswap_v2 | 0xaa38...dffd | 0.7901832638 |
| RZR / frxETH / scrvUSD | curve | 0xc2fc...8bd3 | 0.7000239359 |
| RZR / ETHFI 2% | balancer-v3-ethereum | 0x8115...24fa | 0.7879177395 |
| RZR / ETH 1% | uniswap-v4-ethereum | 0x5124...bcb2 | 0.7798946304 |
| Mog / RZR 1% | uniswap-v4-ethereum | 0xd3af...e7ef | 0.787483234668532 |
| eBTC / RZR 1% | balancer-v3-ethereum | 0x91fa...d304 | 10.1439198767 |
| eBTC / RZR 1% | balancer-v3-ethereum | 0xf948...b842 | 13.7104771778 |
| RZR / lstRZR | curve | 0xe8f4...298a | 0.7104903664 |
| RZR / wstETH 1% | balancer-v3-ethereum | 0xf2d8...622a | 0.7525774935 |
| RZR / weETH 1% | balancer-v3-ethereum | 0x3f89...cfe0 | 1.2782210556 |
| rETH / RZR 1% | sushiswap-v3-ethereum | 0x97f9...8289 | 1.0705866259 |
| USDC / RZR 1% | uniswap-v4-ethereum | 0xc680...2c45 | 10.2047479416 |
| RZR / ETHFI 1% | uniswap-v4-ethereum | 0x5817...22fa | 0.7868563561 |
| RZR / RPL 1% | balancer-v3-ethereum | 0x2d3a...a7e3 | 0.6975287907 |
| rETH / RZR 1% | balancer-v3-ethereum | 0x3c2d...b570 | 1.2893845366 |
| RZR / weETH 1% | uniswap-v4-ethereum | 0x232f...4245 | 0.8203889043 |
| RZR / cbBTC 0.3% | uniswap-v4-ethereum | 0xe222...b1dc | 4.8227312761 |
| RZR / wstETH | uniswap_v2 | 0xd19e...77a1 | 8.8349609764 |
| RZR / eBTC | curve | 0xd989...cc4e | 12.4383575573 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.