| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GRO / USDC | uniswap_v2 | 0x21c5...d2f6 | 0.02325894538 |
| GRO / WETH 0.39% | balancer_ethereum | 0x7026...31ba | 0.02343209632 |
| GRO / GVT | uniswap_v2 | 0x2ac5...e9bb | 0.02378686228 |
| GRO / WETH 0.3% | uniswap_v3 | 0x8229...e57a | 0.399849203821664 |
| GRO / USDC 1% | uniswap_v3 | 0xf2d8...b817 | 12.6974092790334 |
| PWRD / GRO | uniswap_v2 | 0x941f...801f | 0.0336589197887323 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.