Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
gOHM / WETH 0.3% | uniswap_v3 | 0xc987...7e3f | 5202.25684904448 |
gOHM / WETH 1% | uniswap_v3 | 0xcf7e...3e70 | 5226.04615332834 |
gOHM / OHM 0.05% | uniswap_v3 | 0xa3cb...a306 | 5255.57539864928 |
gOHM / ETH 1% | uniswap-v4-ethereum | 0x9962...902a | 5022.39751949051 |
gOHM / WETH | sushiswap | 0x8ed2...b084 | 5031.80574359198 |
gOHM / sDAI 1% | uniswap_v3 | 0xe799...a51e | 6976.066536524 |
gOHM / RENA | uniswap_v2 | 0xbaf2...28be | 5118.95651172186 |
gOHM / USDC 0.3% | uniswap_v3 | 0x08f6...445d | 5211.6721756788 |
FDT / gOHM | sushiswap | 0x75b0...45c1 | 5158.9152391815 |
gOHM / VBTC | uniswap_v2 | 0x7db1...9fe5 | 5182.97687789235 |
gOHM / COMMA | sushiswap | 0x707d...2dc3 | 5167.07258500463 |
gOHM / TEMPLE 1% | uniswap_v3 | 0xeac7...aa67 | 2724.38373932792219588750663496 |
gOHM / OHM 0.3% | uniswap_v3 | 0x6220...6e2c | 5322.930628243 |
gOHM / DAI 0.3% | uniswap_v3 | 0x1ba8...0461 | 3056.26561919854 |
gOHM / BTRFLY 1% | uniswap_v3 | 0x3639...d7fc | 2662.41191122873842976055763184 |
gOHM / USDC 1% | uniswap_v3 | 0x58e8...679d | 5631.6131559256 |
gOHM / OHM 1% | uniswap_v3 | 0x0b4b...9b1d | 2574.0494506202575472329269151 |
gOHM / WAMPL 1% | uniswap_v3 | 0x9892...9692 | 5771.7128518933 |
gOHM / BTRFLY 1% | uniswap_v3 | 0xc266...659f | 3071.37838405827 |
gOHM / LINK 0.3% | uniswap_v3 | 0xb4e4...ba4b | 3099.01798583641 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.