| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GALA / WETH | uniswap_v2 | 0xbe19...1ae3 | 0.0000953596769862574 |
| GALA / WETH | sushiswap | 0xfa40...13bd | 0.0000956330394664499 |
| GALA / WETH 0.3% | uniswap_v3 | 0xf8a9...ab03 | 0.004182599066 |
| GALA / ETH 40% | uniswap-v4-ethereum | 0x8001...d21a | 0.000101706333 |
| GALA / TOWN 0.3% | uniswap_v3 | 0x8452...7124 | 0.00009346156692 |
| GALA / WETH 1% | uniswap_v3 | 0x59f2...3d48 | 0.0003535654111 |
| GALA / USDC | uniswap_v2 | 0x3c36...593c | 0.000008159387248 |
| GALA / WETH | solidlydex | 0xab9b...d98e | 0.0001089488017 |
| GALA / WETH 0.3% | sushiswap-v3-ethereum | 0xcbde...fa72 | 0.0001513473528 |
| GALA / USDT | uniswap_v2 | 0x7d4a...77da | 0.0001609280845 |
| GALA / USDT 1% | uniswap_v3 | 0x0aec...6147 | 0.00019287906 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.