Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GHO / USR | curve | 0x4628...cc52 | 0.981253425806448 |
GHO / crvUSD | curve | 0x635e...8595 | 0.982895407962622 |
GHO / fxUSD | curve | 0x7434...3c5b | 0.991338149613302 |
GHO / USDe | curve | 0x670a...3a61 | 0.981167863460841 |
GHO / USDC 0.05% | uniswap_v3 | 0x5c95...bc1d | 1.00245982916858 |
GHO / cbBTC / WETH | curve | 0x8a4f...d77f | 0.994026675184542 |
GHO / USDC 0.01% | maverick-v2-eth | 0x14cf...6c67 | 1.00118246762401 |
GHO / GHO/USDT/USDC / USDC / USDT 0.05% | balancer_ethereum | 0x8353...b2af | 0.994098107349221 |
GHO / ETH 1% | uniswap-v4-ethereum | 0x2b3f...9795 | 1.0025711982176 |
GHO / crvFRAX | curve | 0xbc90...0b2d | 0.998897755536524 |
GHO / USDC 0.01% | balancer_ethereum | 0x3932...c283 | 0.998901141717949 |
GHO / USDC 0.01% | uniswap-v4-ethereum | 0xae8e...bcb4 | 1.16183704360887 |
GHO / USDC 0.01% | balancer_ethereum | 0x99e7...09ac | 0.99985999866207 |
GHO / USDC 0.01% | maverick-v2-eth | 0x8dd4...7a61 | 1.00314469747241 |
GHO / GHO/bb-a-USD / bb-a-USD 0.05% | balancer_ethereum | 0xc2b0...225b | 0.975534149441566 |
GHO / DMusd 0.01% | sushiswap-v3-ethereum | 0xb6e0...ac08 | 0.9995137097 |
GHO / WBTC / wstETH | curve | 0x8cd5...3ee9 | 0.998805918354923 |
GHO / USDC-DAI-USDT / GHO-3POOL-BPT 0.05% | balancer_ethereum | 0xbe19...6747 | 1.03824860610389 |
GHO / USDC 0.05% | uniswap-v4-ethereum | 0xb3ec...c03c | 0.9988791828 |
stkGHO / GHO 85% | uniswap-v4-ethereum | 0x9054...13f4 | 0.9913359159 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.