| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GLM / ETH 1% | uniswap-v4-ethereum | 0xff70...7211 | 0.1317324868 |
| GLM / WETH 1% | uniswap_v3 | 0x531b...be0b | 0.129799584 |
| SOTU / GLM | uniswap_v2 | 0xc240...e57f | 0.13267750286171 |
| GLM / WETH | uniswap_v2 | 0xb5f7...59f4 | 0.1303260127 |
| GLM / WETH | sushiswap | 0x5682...069b | 0.1282685364 |
| GLM / WETH 0.3% | uniswap_v3 | 0xfe4e...ff0d | 0.1289875271 |
| GLM / USDT 1% | uniswap-v4-ethereum | 0x6565...6565 | 0.2148334602 |
| GLM / USDC 0.3% | uniswap-v4-ethereum | 0xba22...d825 | 0.284224039 |
| GLM / USDC 1% | uniswap_v3 | 0x6025...8658 | 0.2987884254 |
| GLM / USDT 1% | uniswap_v3 | 0x20da...ea5b | 0.2978901683 |
| GLM / DAI 1% | uniswap_v3 | 0x60a5...c929 | 0.2998425334 |
| GLM / USDC | uniswap_v2 | 0x6b4d...792e | 0.00320307553 |
| ELON / GLM 1% | uniswap_v3 | 0x2c6e...e6f1 | 0.256449830628816 |
| GLM / USDC 0.01% | uniswap_v3 | 0xf1d7...fc3d | 0.2848256647 |
| GLM / USDT | uniswap_v2 | 0xa5bd...93ad | 0.23504123693929414206431100644310931720167764520871780694589314476199956952321454388584121 |
| GLM / KABOSU | uniswap_v2 | 0xbb0f...7fd6 | 0.2076958797 |
| GLM / DOGE2.0 | uniswap_v2 | 0x0db8...c9ef | 0.176234676515108 |
| GLM / DAI | uniswap_v2 | 0x0ddc...e76e | 0.23037507764711338473693790004507835540375981500797327065618726359798109616600293723246304 |
| RLTM / GLM 1% | uniswap_v3 | 0xed2d...b350 | 0.160493006841633 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.