Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GHO / USDC | fluid-ethereum | 0xde63...ee45 | 1.00285803924853 |
GHO / sUSDe | fluid-ethereum | 0xdd5f...6be3 | 1.00192908936806 |
GHO / USDe | fluid-ethereum | 0x862f...b06d | 1.00144825081205 |
GHO / fxUSD | curve | 0x7434...3c5b | 0.986812603912447 |
GHO / USDe | curve | 0x670a...3a61 | 0.988568711361284 |
GHO / crvUSD | curve | 0x635e...8595 | 0.985951244931329 |
GHO / cbBTC / WETH | curve | 0x8a4f...d77f | 0.985106540669815 |
GHO / USR | curve | 0x4628...cc52 | 0.988919218936491 |
GHO / USDC 0.05% | uniswap_v3 | 0x5c95...bc1d | 1.00335635443508 |
GHO / USDC 0.05% | uniswap-v4-ethereum | 0xb3ec...c03c | 1.0019856017176 |
GHO / GHO/USDT/USDC / USDC / USDT 0.05% | balancer_ethereum | 0x8353...b2af | 0.9940981073 |
GHO / ETH 1% | uniswap-v4-ethereum | 0x2b3f...9795 | 1.000778666822 |
GHO / WBTC / wstETH | curve | 0x8cd5...3ee9 | 0.9975558323282 |
GHO / USDC 0.01% | maverick-v2-eth | 0x14cf...6c67 | 1.0026641588571 |
GHO / USDC 0.01% | maverick-v2-eth | 0xc8c9...ef27 | 1.00184869789262 |
GHO / GHO/bb-a-USD / bb-a-USD 0.05% | balancer_ethereum | 0xc2b0...225b | 0.975534149441566 |
GHO / DMusd 0.01% | sushiswap-v3-ethereum | 0xb6e0...ac08 | 0.9995137097 |
stkGHO / GHO 85% | uniswap-v4-ethereum | 0x9054...13f4 | 0.9851619443 |
GHO / DFiUSD 0.01% | uniswap-v4-ethereum | 0x98a5...d6c8 | 0.995717093192482 |
stkGHO / GHO 30% | uniswap-v4-ethereum | 0x8be4...d137 | 0.9900104735 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.