Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GHO / USR | curve | 0x4628...cc52 | 0.995864988455131 |
GHO / fxUSD | curve | 0x7434...3c5b | 0.994900933907667 |
GHO / crvUSD | curve | 0x635e...8595 | 0.996919738029708 |
GHO / USDC 0.05% | uniswap_v3 | 0x5c95...bc1d | 0.99937921935439 |
GHO / USDe | curve | 0x670a...3a61 | 0.991424291201656 |
GHO / cbBTC / WETH | curve | 0x8a4f...d77f | 0.99984725740232 |
GHO / GHO/USDT/USDC / USDC / USDT 0.05% | balancer_ethereum | 0x8353...b2af | 0.9940981073 |
GHO / USDC 0.01% | maverick-v2-eth | 0x14cf...6c67 | 0.998263651958185 |
GHO / ETH 1% | uniswap-v4-ethereum | 0x2b3f...9795 | 0.982826452390825 |
GHO / USDC 0.01% | balancer_ethereum | 0x99e7...09ac | 0.99786443139348 |
GHO / wstETH 0.3% | balancer_ethereum | 0x7d98...aa64 | 1.11567124018813 |
GHO / GHO/bb-a-USD / bb-a-USD 0.05% | balancer_ethereum | 0xc2b0...225b | 0.975534149441566 |
GHO / DMusd 0.01% | sushiswap-v3-ethereum | 0xb6e0...ac08 | 0.9995137097 |
stkGHO / GHO 30% | uniswap-v4-ethereum | 0x8be4...d137 | 0.983584630321442 |
GHO / USDC-DAI-USDT / GHO-3POOL-BPT 0.05% | balancer_ethereum | 0xbe19...6747 | 1.03824860610389 |
GHO / WBTC / wstETH | curve | 0x8cd5...3ee9 | 0.9938110624 |
GHO / USDC 0.05% | uniswap-v4-ethereum | 0xb3ec...c03c | 0.9988791828 |
GHO / crvFRAX | curve | 0xbc90...0b2d | 0.981798768551016 |
stkGHO / GHO 85% | uniswap-v4-ethereum | 0x9054...13f4 | 0.9913359159 |
GHO / UNION 0.3% | uniswap_v3 | 0x1a7c...77c3 | 1.0000486551 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.