Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GME / WETH | uniswap_v2 | 0x2aee...83c9 | 0.0000618894128014805 |
GME / WETH 1% | uniswap_v3 | 0x0539...22dc | 0.0000612406146885596 |
KEK / GME 1% | uniswap-v4-ethereum | 0xe989...5319 | 0.0000615470746889936 |
TrumpBucks / GME 1% | uniswap-v4-ethereum | 0x4d9b...011f | 0.0000652574931975046 |
ARRKY / GME 1% | uniswap_v3 | 0x57fe...e112 | 0.0000504658682855911 |
GME / LUNA 1% | uniswap_v3 | 0x4a7e...f30c | 0.00005344384598 |
BOOE / GME 1% | uniswap-v4-ethereum | 0x847a...bf2f | 0.0000515919568748032 |
ETH / GME 1% | uniswap-v4-ethereum | 0xc6f9...ab3a | 0.00006292468037 |
GME / LUNA 0.3% | uniswap-v4-ethereum | 0x5c59...33e8 | 0.0001007471207 |
pepecoin / GME 1% | uniswap-v4-ethereum | 0x5de1...78af | 0.00006151475102 |
GME / LUNA 1% | uniswap-v4-ethereum | 0x39a6...09c4 | 0.00009475422302 |
TUSK / GME 1% | uniswap-v4-ethereum | 0x8ab3...366c | 0.00008883253956 |
NFAi / GME 1% | uniswap_v3 | 0x0e34...c033 | 0.0000112477305339206 |
LGB / GME 0.3% | uniswap-v4-ethereum | 0x6b61...b60b | 0.00009317170471 |
GME / WETH | sushiswap | 0x28ea...51de | 0.0001025961452 |
FIDO / GME 0.3% | uniswap-v4-ethereum | 0x89d2...7235 | 0.00009575649656 |
GME / n 1% | uniswap_v3 | 0xfdfb...3acb | 0.0000365807990611835 |
TrumpBucks / GME 1% | uniswap_v3 | 0x8350...b259 | 0.0001222632874 |
pepecoin / GME 1% | uniswap_v3 | 0x414b...f899 | 0.0003127271824 |
GME / WETH 0.3% | uniswap_v3 | 0x7f38...e6c1 | 0.00005762519678 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.