Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GEL / ETH 1% | uniswap-v4-ethereum | 0x708e...d2a5 | 0.0343082508391749 |
GEL / WETH 1% | uniswap_v3 | 0x2dd3...2ec1 | 0.0398974803918348 |
GEL / USDT 1% | kyberswap_elastic | 0xde2a...ee9e | 0.363857260473884266807271835072 |
GEL / USDC 1% | uniswap_v3 | 0x502f...585e | 0.906521671679243 |
GEL / USDC 0.05% | uniswap_v3 | 0x9f3a...e990 | 0.248434665952689 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.