| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| gOHM / WETH 0.3% | uniswap_v3 | 0xc987...7e3f | 4654.1398665849 |
| gOHM / WETH 1% | uniswap_v3 | 0xcf7e...3e70 | 4588.5677387 |
| gOHM / ETH 1% | uniswap-v4-ethereum | 0x9962...902a | 4601.5675578941 |
| gOHM / RENA | uniswap_v2 | 0xbaf2...28be | 4620.8119089802 |
| gOHM / OHM 0.05% | uniswap_v3 | 0xa3cb...a306 | 4621.599511184 |
| gOHM / USDC 0.3% | uniswap_v3 | 0x08f6...445d | 4624.7846043427 |
| gOHM / VBTC | uniswap_v2 | 0x7db1...9fe5 | 4594.3282853664 |
| gOHM / WETH | sushiswap | 0x8ed2...b084 | 4645.3904935997 |
| gOHM / COMMA | sushiswap | 0x707d...2dc3 | 4620.1966679412 |
| gOHM / sDAI 1% | uniswap_v3 | 0xe799...a51e | 5596.6446256517 |
| FDT / gOHM | sushiswap | 0x75b0...45c1 | 4617.65917569165 |
| gOHM / TEMPLE 1% | uniswap_v3 | 0xeac7...aa67 | 2724.38373932792219588750663496 |
| gOHM / OHM 0.3% | uniswap_v3 | 0x6220...6e2c | 5929.497713049 |
| gOHM / DAI 0.3% | uniswap_v3 | 0x1ba8...0461 | 3056.26561919854 |
| gOHM / LUNA 1% | uniswap_v3 | 0x26db...ce4f | 2607.87249081749550410567837432 |
| gOHM / BTRFLY 1% | uniswap_v3 | 0x3639...d7fc | 2662.41191122873842976055763184 |
| gOHM / USDC 1% | uniswap_v3 | 0x58e8...679d | 5631.6131559256 |
| gOHM / FRAX 0.3% | uniswap_v3 | 0xac69...8ea0 | 2593.57211561329393349557374893 |
| gOHM / DAI 1% | uniswap_v3 | 0x5d66...97f6 | 2516.91867602260980108786013796 |
| gOHM / BTRFLY 0.3% | uniswap_v3 | 0x7bd4...6548 | 2598.68606859785020117740106989 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.