| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| renBTC / WBTC / sBTC | curve | 0x7fc7...9714 | 14782.5079220034 |
| renBTC / WBTC | curve | 0x9305...895b | 16285.9953322133 |
| renBTC / RAIL | sushiswap | 0x5198...72d6 | 14132.5177217646 |
| renBTC / WETH | uniswap_v2 | 0x81fb...00b3 | 16718.6291221666 |
| renBTC / sil | sushiswap | 0x7088...7484 | 14545.9083940095 |
| renBTC / WBTC / sBTC 0.02% | balancer_ethereum | 0xfead...cc56 | 3139.409420579 |
| silv2 / renBTC | sushiswap | 0xf3c5...b816 | 15138.3899250187 |
| renBTC / WETH 0.3% | uniswap_v3 | 0x3cb7...dc4f | 16659.9764167654 |
| renBTC / USDC | uniswap_v2 | 0xdd71...fafa | 16869.1198585674 |
| renBTC / WBTC 0.05% | uniswap_v3 | 0x3730...aa7f | 85646.3171936885 |
| renBTC / WETH | defi_swap | 0x3087...a2ce | 15934.385503092 |
| TNG / renBTC 1% | uniswap_v3 | 0xf8c3...c883 | 14167.5344065161 |
| renBTC / WBTC 0.01% | uniswap_v3 | 0xeb1f...2a2f | 112217.403378141 |
| CRO / renBTC | defi_swap | 0x5d30...6466 | 15089.0110932213 |
| renBTC / DAI | uniswap_v2 | 0x7f4b...d26b | 16532.9835727136 |
| RAIL / renBTC 1% | uniswap_v3 | 0x7926...a592 | 10204.5151875497 |
| renBTC / WETH 0.05% | uniswap_v3 | 0xda2b...7ac3 | 29653.5925511035650622907850854384 |
| renBTC / WBTC | sushiswap | 0x518d...06c5 | 15388.3229107587 |
| renBTC / WBTC 0.3% | uniswap_v3 | 0x7cf8...b7cd | 18102.38192896878194660791449 |
| renBTC / WETH | sushiswap | 0x0289...bdaa | 15000.5805712615 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.