Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
gOHM / WETH 1% | uniswap_v3 | 0xcf7e...3e70 | 6233.96043467392 |
gOHM / OHM 0.3% | uniswap_v3 | 0x6220...6e2c | 6183.44511361671 |
gOHM / USDC 0.3% | uniswap_v3 | 0x08f6...445d | 6146.19322386887 |
gOHM / RENA | uniswap_v2 | 0xbaf2...28be | 6209.68632790422 |
gOHM / ETH 1% | uniswap-v4-ethereum | 0x9962...902a | 6206.38501332545 |
FDT / gOHM | sushiswap | 0x75b0...45c1 | 6152.44349913611 |
gOHM / VBTC | uniswap_v2 | 0x7db1...9fe5 | 6153.11805571791 |
gOHM / WETH | sushiswap | 0x8ed2...b084 | 6098.55602320039 |
gOHM / WETH 0.3% | uniswap_v3 | 0xc987...7e3f | 6417.7832405244 |
gOHM / sDAI 1% | uniswap_v3 | 0xe799...a51e | 6976.066536524 |
gOHM / COMMA | sushiswap | 0x707d...2dc3 | 6043.7106521299 |
gOHM / TEMPLE 1% | uniswap_v3 | 0xeac7...aa67 | 2724.38373932792219588750663496 |
gOHM / DAI 0.3% | uniswap_v3 | 0x1ba8...0461 | 3056.26561919854 |
gOHM / BTRFLY 1% | uniswap_v3 | 0x3639...d7fc | 2662.41191122873842976055763184 |
gOHM / USDC 1% | uniswap_v3 | 0x58e8...679d | 5631.6131559256 |
gOHM / OHM 1% | uniswap_v3 | 0x0b4b...9b1d | 2574.0494506202575472329269151 |
gOHM / WAMPL 1% | uniswap_v3 | 0x9892...9692 | 5771.7128518933 |
gOHM / BTRFLY 1% | uniswap_v3 | 0xc266...659f | 3071.37838405827 |
gOHM / LINK 0.3% | uniswap_v3 | 0xb4e4...ba4b | 3099.01798583641 |
gOHM / OHM 0.05% | uniswap_v3 | 0xa3cb...a306 | 5708.0773564699 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.