| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GGBR / USDT 0.3% | uniswap_v3 | 0x75a5...0dac | 4.7137004405 |
| GGBR / USDT 0.01% | uniswap-v4-ethereum | 0x857b...c4a4 | 4.9245878917 |
| GGBR / USDT 0.3% | uniswap-v4-ethereum | 0xa535...b2d4 | 4.8165846201 |
| GGBR / USDC 0.01% | uniswap_v3 | 0x80f7...6387 | 4.7629934464 |
| GGBR / USDT 0.01% | uniswap_v3 | 0x3308...8739 | 5.2911805364 |
| GGBR / USDT 0.05% | uniswap_v3 | 0x40c2...779c | 5.0849260361 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.