| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GRT / WETH | uniswap_v2 | 0x2e81...4d70 | 0.0414049112339987 |
| GRT / WETH 0.3% | uniswap_v3 | 0x0e2c...b5ed | 0.0416333643300442 |
| GRT / WETH | sushiswap | 0x7b50...0c19 | 0.0415425004329117 |
| GRT / USDC 0.3% | uniswap_v3 | 0xb06e...98c5 | 0.0416876641486094 |
| GRT / ETH 0.3% | uniswap-v4-ethereum | 0x98e5...d0fa | 0.0419444973242507 |
| GRT / ETH 1% | uniswap-v4-ethereum | 0x1dfc...ecc7 | 0.0417571575647102 |
| GRT / WETH | shibaswap | 0x6d2a...08d8 | 0.0420802760116765 |
| GRT / SOTU | uniswap_v2 | 0xa67a...0062 | 0.0421108614183158 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 160.897173031965 |
| USDC / GRT 0.3% | uniswap-v4-ethereum | 0x84bc...f9e4 | 0.09150728404 |
| GRT / USDC 0.35% | balancer_ethereum | 0x1446...7ab4 | 0.0416108284309807 |
| GRT / USDC | uniswap_v2 | 0xdfa4...0c8f | 0.0410054517919715 |
| GRT / WETH 1% | uniswap_v3 | 0x46ad...2164 | 0.1618581813 |
| GRT / WETH 0.15% | balancer_ethereum | 0x89ea...4472 | 0.0389106921803978 |
| GRT / USDT | uniswap_v2 | 0x6476...47ad | 0.0372792122275941 |
| GRT / DAI | uniswap_v2 | 0x7c62...8f92 | 0.03951225333 |
| GRT / LINK 1% | uniswap_v3 | 0xeb5c...6267 | 0.08472492595 |
| USDC / GRT 0.1% | uniswap-v4-ethereum | 0x49ea...1026 | 0.1109064026 |
| GRT / USDC | sushiswap | 0xa206...7101 | 0.04446515387 |
| LEASH / GRT | shibaswap | 0xa29f...9ebe | 0.0503855327 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.