| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| renBTC / WBTC / sBTC | curve | 0x7fc7...9714 | 4349.0636794515 |
| renBTC / WBTC | curve | 0x9305...895b | 4340.5881707511 |
| renBTC / WETH | uniswap_v2 | 0x81fb...00b3 | 4242.6177164848 |
| renBTC / RAIL | sushiswap | 0x5198...72d6 | 4356.9132925735 |
| renBTC / sil | sushiswap | 0x7088...7484 | 4207.3256393986 |
| renBTC / USDC | uniswap_v2 | 0xdd71...fafa | 4267.562882232 |
| silv2 / renBTC | sushiswap | 0xf3c5...b816 | 4254.79571095007 |
| renBTC / WETH | defi_swap | 0x3087...a2ce | 4220.5980387965 |
| renBTC / DAI | uniswap_v2 | 0x7f4b...d26b | 4367.2817016365 |
| renBTC / WBTC / sBTC 0.02% | balancer_ethereum | 0xfead...cc56 | 3139.409420579 |
| renBTC / WETH 0.3% | uniswap_v3 | 0x3cb7...dc4f | 4280.3744657092 |
| renBTC / WBTC 0.05% | uniswap_v3 | 0x3730...aa7f | 85646.3171936885 |
| renBTC / WBTC 0.01% | uniswap_v3 | 0xeb1f...2a2f | 112217.403378141 |
| TNG / renBTC 1% | uniswap_v3 | 0xf8c3...c883 | 4341.55107000567 |
| CRO / renBTC | defi_swap | 0x5d30...6466 | 4400.87239163 |
| RAIL / renBTC 1% | uniswap_v3 | 0x7926...a592 | 10204.5151875497 |
| renBTC / WETH 0.05% | uniswap_v3 | 0xda2b...7ac3 | 29653.5925511035650622907850854384 |
| renBTC / WBTC 0.3% | uniswap_v3 | 0x7cf8...b7cd | 18102.38192896878194660791449 |
| renBTC / WBTC | sushiswap | 0x518d...06c5 | 3580.4825375797 |
| renBTC / WETH | sushiswap | 0x0289...bdaa | 3649.3441402711 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.