| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GEAR / WETH | curve | 0x0e9b...f1c2 | 0.00156370611844487 |
| GEAR / WETH | uniswap_v2 | 0xe3ef...8bf8 | 0.00158139980416637 |
| GEAR / USDT 0.3% | uniswap_v3 | 0x349e...18c9 | 0.004117277925 |
| SOCKS / GEAR 5% | uniswap-v4-ethereum | 0x12c1...2c9a | 0.002646626913 |
| GEAR / KABOSU 0.3% | uniswap_v3 | 0xc4fd...3db9 | 0.00159768126687576 |
| USDC / GEAR 88% | uniswap-v4-ethereum | 0x0fc2...fa06 | 0.0004700938756 |
| QUINTA / GTEC / GEAR | curve | 0x75f0...83dd | 0.0000323095245073802 |
| GEAR / WETH 1% | uniswap_v3 | 0xaef5...ee50 | 0.000000170701305 |
| GEAR / KABOSU | uniswap_v2 | 0xd00a...2d1c | 0.004244255567 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.