Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
oGPU / WETH | uniswap_v2 | 0x3415...86f6 | 0.443894964655684 |
oGPU / WETH 1% | uniswap_v3 | 0xb8c3...6547 | 0.465426989763126 |
TAKO / oGPU | uniswap_v2 | 0x3897...7a38 | 0.447172891726462 |
oGPU / USDT 1% | uniswap_v3 | 0x7cc5...5111 | 0.946363237265695 |
oGPU / USDC 1% | uniswap_v3 | 0xa9da...a4e3 | 1.62297717015862 |
oGPU / USDC 0.3% | uniswap_v3 | 0x8533...d35c | 1.45120990716092 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.