| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GNUS / WETH 1% | uniswap_v3 | 0xf10e...a281 | 0.608295240287895 |
| GNUS / USDT 99.995% | uniswap-v4-ethereum | 0x5ec1...77b4 | 0.04389873637 |
| GNUS / USDT 99.113% | uniswap-v4-ethereum | 0xd3f7...4e3a | 0.05266650441 |
| GNUS / USDT 99.9% | uniswap-v4-ethereum | 0x31c8...6903 | 1.1383095522 |
| GNUS / ETH 99.9% | uniswap-v4-ethereum | 0x5873...0b88 | 0.08942340051 |
| GNUS / USDC | uniswap_v2 | 0x31ba...d1f5 | 2.8878564323 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.