Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GMT / WETH 1% | uniswap_v3 | 0xc2fa...3efd | 0.423970586702422 |
GMT / ETH 1% | uniswap-v4-ethereum | 0x56b6...457d | 0.443628474699466 |
GMT / ETH 0.3% | uniswap-v4-ethereum | 0x8523...e305 | 0.3764357773 |
GMT / WETH 1% | pancakeswap-v3-ethereum | 0x1009...23b5 | 0.167389373237342 |
GMT / WETH 0.3% | uniswap_v3 | 0x943c...bbad | 0.4226466247 |
GMT / USDT 0.3% | uniswap_v3 | 0xe729...9e7a | 0.101074382763331 |
GMT / WETH | sushiswap | 0x9c40...0d8e | 0.2657017036 |
GMT / USDT 0.01% | uniswap_v3 | 0xb54b...aac1 | 0.4696444817 |
GMT / USDT 1% | uniswap_v3 | 0xf633...571b | 0.116030706682004 |
GMT / WETH | uniswap_v2 | 0x8d51...0bab | 0.488120805 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.