| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| RIO / WETH 0.3% | uniswap_v3 | 0x5b7e...7508 | 0.001852962733 |
| RIO / WETH | uniswap_v2 | 0x0b85...13b8 | 0.001862517311 |
| RIO / ETH 0.3% | uniswap-v4-ethereum | 0xdb5a...7c79 | 0.01739636863 |
| LMX / RIO | uniswap_v2 | 0xd808...bd2b | 0.00189497939923821 |
| RIO / ETH 50% | uniswap-v4-ethereum | 0xdfe5...4a66 | 0.01077619454 |
| RIO / ETH 70.01% | uniswap-v4-ethereum | 0xebef...af96 | 0.001176574482 |
| USDC / RIO 1% | uniswap-v4-ethereum | 0x628d...02e3 | 0.007882677897 |
| RIO / RST | uniswap_v2 | 0x4502...a81b | 0.00189708445 |
| RIO / ETH 70% | uniswap-v4-ethereum | 0x3437...5c0e | 0.01089129296 |
| RIO / NEXO | uniswap_v2 | 0x8f61...e4e9 | 0.001950901263 |
| RIO / USDC 0.3% | uniswap_v3 | 0x8ba7...8d87 | 1.47352509453898 |
| RIO / WETH | sushiswap | 0x5fb1...d9d4 | 0.002305653683 |
| xRIO / RIO 1% | uniswap_v3 | 0x93fc...639b | 0.0857119693995121504673106980433 |
| RIO / WETH 1% | uniswap_v3 | 0x76ac...a3a9 | 0.03076663035 |
| rUSD / RIO | uniswap_v2 | 0x06ed...4b5b | 0.00198546701285885 |
| USDT / RIO 1% | uniswap-v4-ethereum | 0xd84b...ba89 | 0.007631810693 |
| RIO / rUSD 0.3% | uniswap_v3 | 0xd626...52af | 0.950294220919138 |
| RIO / USDC 1% | uniswap_v3 | 0x7329...82a9 | 0.707930509206854 |
| xRIO / RIO | uniswap_v2 | 0x5f03...057d | 0.01310067887 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.