| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RAI / USDT 80% | uniswap-v4-ethereum | 0xc0b4...7e94 | 0.0675302400964548 |
| RAI / WETH | uniswap_v2 | 0x4de8...7341 | 0.0399455313187385 |
| RAI / WETH 1% | uniswap_v3 | 0xbeb3...2707 | 0.6947270776 |
| RAI / ETH 77% | uniswap-v4-ethereum | 0xf52d...b817 | 0.09708615462 |
| RAI / ETH 40% | uniswap-v4-ethereum | 0xa232...99e8 | 0.07659992108 |
| RAI / ETH 50% | uniswap-v4-ethereum | 0x3903...483e | 0.1212283427 |
| RAI / USDT 88% | uniswap-v4-ethereum | 0x8751...4da8 | 0.002435699748 |
| RAI / ETH 60% | uniswap-v4-ethereum | 0x83e4...e5c0 | 0.09698024796 |
| USDC / RAI 10% | uniswap-v4-ethereum | 0x9b58...1453 | 0.1827288042 |
| RAI / WETH 0.3% | uniswap_v3 | 0x390a...ad17 | 1.6401156538 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.