| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DELTA rLP / WETH | uniswap_v2 | 0xb9a5...7f0a | 10.5521768395364 |
| DAI / DELTA rLP 10% | uniswap-v4-ethereum | 0x76d0...c1a6 | 26.9579872996 |
| DELTA rLP / WETH 1% | uniswap_v3 | 0x393c...8f65 | 4.2191480143 |
| DELTA rLP / DAI 1% | uniswap_v3 | 0x1a25...4fe0 | 46.2608806278 |
| DELTA rLP / WETH | sushiswap | 0xd80e...349d | 13.1376985528 |
| DELTA rLP / USDC 1% | uniswap_v3 | 0x6246...31b0 | 43.9238469869788 |
| DELTA rLP / DAI 0.3% | uniswap_v3 | 0xcb1a...e5ff | 19.0374795023 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.