Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GST / USDC | dooar_ethereum | 0x770c...e514 | 0.0129539079167319 |
GST / USDC 1% | uniswap_v3 | 0xe2a8...3133 | 3.51754592010058 |
GST / USDC | uniswap_v2 | 0xf6b6...9364 | 0.01208129979 |
GST / WETH | dooar_ethereum | 0x09d6...a65a | 0.0145535988684189 |
GST / APE | dooar_ethereum | 0x67d4...61d8 | 0.035680956586196 |
GST2 / GST | dooar_ethereum | 0x1d24...e593 | 0.0336264768432367 |
GST / GMT | dooar_ethereum | 0xda97...7228 | 0.0111150152206499 |
GST / USDC | sushiswap | 0x413d...ed6c | 0.0428855042599573 |
GST / WETH 0.3% | uniswap_v3 | 0x1957...a3a3 | 2.545886377045187900589644190615 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.