| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RZR / WETH | uniswap_v2 | 0xaa38...dffd | 1.34905953147446 |
| RZR / frxETH / scrvUSD | curve | 0xc2fc...8bd3 | 1.508685336257401659960296655394104576908560873715009762046898275 |
| RZR / ETHFI 2% | balancer-v3-ethereum | 0x8115...24fa | 1.35295657562715 |
| Mog / RZR 1% | uniswap-v4-ethereum | 0xd3af...e7ef | 1.39142137990335 |
| eBTC / RZR 1% | balancer-v3-ethereum | 0x91fa...d304 | 10.1439198767 |
| RZR / ETH 1% | uniswap-v4-ethereum | 0x5124...bcb2 | 1.44359693541728 |
| eBTC / RZR 1% | balancer-v3-ethereum | 0xf948...b842 | 13.7104771778 |
| RZR / wstETH 1% | balancer-v3-ethereum | 0xf2d8...622a | 1.44263429469754 |
| RZR / lstRZR | curve | 0xe8f4...298a | 1.6500774451 |
| RZR / weETH 1% | balancer-v3-ethereum | 0x3f89...cfe0 | 1.42639906262315 |
| rETH / RZR 1% | sushiswap-v3-ethereum | 0x97f9...8289 | 1.46309858560564 |
| USDC / RZR 1% | uniswap-v4-ethereum | 0xc680...2c45 | 10.2047479416 |
| RZR / ETHFI 1% | uniswap-v4-ethereum | 0x5817...22fa | 1.42577440813555 |
| RZR / RPL 1% | balancer-v3-ethereum | 0x2d3a...a7e3 | 1.5212741927 |
| rETH / RZR 1% | balancer-v3-ethereum | 0x3c2d...b570 | 1.54350206616566 |
| RZR / weETH 1% | uniswap-v4-ethereum | 0x232f...4245 | 2.1267428429 |
| RZR / cbBTC 0.3% | uniswap-v4-ethereum | 0xe222...b1dc | 4.8227312761 |
| RZR / wstETH | uniswap_v2 | 0xd19e...77a1 | 8.8349609764 |
| RZR / eBTC | curve | 0xd989...cc4e | 12.4383575573 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.