| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DELTA rLP / WETH 1% | uniswap_v3 | 0x393c...8f65 | 4.2191480143 |
| DELTA rLP / WETH | uniswap_v2 | 0xb9a5...7f0a | 22.7954121194398 |
| DELTA rLP / DAI 1% | uniswap_v3 | 0x1a25...4fe0 | 46.2608806278 |
| DELTA rLP / WETH | sushiswap | 0xd80e...349d | 19.4514266362135 |
| DELTA rLP / DAI 0.3% | uniswap_v3 | 0xcb1a...e5ff | 19.0374795023 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.