Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GHO / USR | curve | 0x4628...cc52 | 0.983285133035584 |
GHO / fxUSD | curve | 0x7434...3c5b | 0.981363812935014 |
GHO / crvUSD | curve | 0x635e...8595 | 0.980163457693407 |
GHO / USDC 0.05% | uniswap-v4-ethereum | 0xb3ec...c03c | 0.999524995394382 |
GHO / USDC 0.05% | uniswap_v3 | 0x5c95...bc1d | 1.00012362891034 |
GHO / USDe | curve | 0x670a...3a61 | 0.983285133035584 |
GHO / cbBTC / WETH | curve | 0x8a4f...d77f | 0.973154100710131 |
GHO / GHO/USDT/USDC / USDC / USDT 0.05% | balancer_ethereum | 0x8353...b2af | 0.9940981073 |
GHO / ETH 1% | uniswap-v4-ethereum | 0x2b3f...9795 | 1.00003335073743 |
GHO / DFiUSD 0.01% | uniswap-v4-ethereum | 0x98a5...d6c8 | 0.994916986313353 |
GHO / USDC 0.01% | maverick-v2-eth | 0x14cf...6c67 | 0.999724946521949 |
GHO / GYD 0.01% | balancer_ethereum | 0xaa7a...f63b | 0.994575097698857 |
GHO / WBTC / wstETH | curve | 0x8cd5...3ee9 | 1.01096368129503 |
GHO / USDC 0.01% | maverick-v2-eth | 0xc8c9...ef27 | 0.999100694402645 |
GHO / USDC 0.01% | balancer_ethereum | 0x3932...c283 | 1.00120753689921 |
GHO / GHO/bb-a-USD / bb-a-USD 0.05% | balancer_ethereum | 0xc2b0...225b | 0.975534149441566 |
GHO / DMusd 0.01% | sushiswap-v3-ethereum | 0xb6e0...ac08 | 0.9995137097 |
stkGHO / GHO 30% | uniswap-v4-ethereum | 0x8be4...d137 | 0.9984449619 |
GHO / USDC-DAI-USDT / GHO-3POOL-BPT 0.05% | balancer_ethereum | 0xbe19...6747 | 1.03824860610389 |
stkGHO / GHO 85% | uniswap-v4-ethereum | 0x9054...13f4 | 0.9913359159 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.