| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RPL / WETH 0.3% | uniswap_v3 | 0xe423...eb45 | 1.71228994367313 |
| rETH / RPL 0.3% | uniswap_v3 | 0x3051...99b4 | 1.71307028230214 |
| RPL / ETH 0.3% | uniswap-v4-ethereum | 0x95f5...8973 | 1.71806993200274 |
| RPL / RPL 0.3% | uniswap_v3 | 0xe67d...457f | 1.79910155232252 |
| rETH / RPL 0.25% | balancer_ethereum | 0x9f9d...f298 | 1.71286281510245 |
| AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 128.564748037388 |
| RPL / WETH 0.25% | pancakeswap-v3-ethereum | 0xcc76...1a41 | 1.79590379914862 |
| rETH / RPL 0.25% | balancer_ethereum | 0x0fd5...0b8b | 1.8310480110892 |
| BOLD / RPL 1% | uniswap-v4-ethereum | 0xd4d7...87a5 | 1.9104032546 |
| RPL / USDT 1% | uniswap-v4-ethereum | 0x40c9...7a5e | 4.9928034724 |
| RPL / USDT 70% | uniswap-v4-ethereum | 0x13bc...75e9 | 0.8407361105 |
| RPL / WETH 1% | uniswap_v3 | 0xcf15...f640 | 9.1861607447 |
| RPL / RPL 0.05% | uniswap_v3 | 0xf2c7...6c8e | 22.0693306788148 |
| RPL / USDC 1% | uniswap_v3 | 0x417b...7a5e | 18.4507460403 |
| USDC / RPL 1% | uniswap-v4-ethereum | 0xf350...1c88 | 3.2635926559 |
| RPL / USDT 60% | uniswap-v4-ethereum | 0xec63...f5de | 1.6245274031 |
| RPL / WETH | curve | 0xaf69...54d9 | 61.1402118015161 |
| RZR / RPL 1% | balancer-v3-ethereum | 0x2d3a...a7e3 | 1.74776284724289 |
| RAI / FLX / rETH / WETH / RPL 10% | balancer_ethereum | 0xb721...b796 | 4.3643680626 |
| RPL / WETH 0.05% | uniswap_v3 | 0x3bc7...76b9 | 28.8025871178234 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.