| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GRT / WETH | uniswap_v2 | 0x2e81...4d70 | 0.0266728284518675 |
| GRT / WETH | sushiswap | 0x7b50...0c19 | 0.0265926039507562 |
| GRT / WETH 0.3% | uniswap_v3 | 0x0e2c...b5ed | 0.026609491153081 |
| GRT / USDC 0.3% | uniswap_v3 | 0xb06e...98c5 | 0.0264617586990903 |
| GRT / ETH 0.3% | uniswap-v4-ethereum | 0x98e5...d0fa | 0.0264451314777055 |
| GRT / ETH 1% | uniswap-v4-ethereum | 0x1dfc...ecc7 | 0.0261118843845207 |
| GRT / WETH | shibaswap | 0x6d2a...08d8 | 0.0259736696003169 |
| GRT / SOTU | uniswap_v2 | 0xa67a...0062 | 0.0263582536064491 |
| GRT / USDC 0.35% | balancer_ethereum | 0x1446...7ab4 | 0.0262424835105794 |
| GRT / USDC | uniswap_v2 | 0xdfa4...0c8f | 0.0261610690418618 |
| USDC / GRT 0.3% | uniswap-v4-ethereum | 0x84bc...f9e4 | 0.09150728404 |
| AAVE / UNI / SUSHI / MKR / COMP / SNX / GRT / CRV 0.5% | balancer_ethereum | 0x3b40...b280 | 118.473954331129 |
| GRT / WETH 1% | uniswap_v3 | 0x46ad...2164 | 0.0697867197527722 |
| GRT / USDT 0.3% | uniswap-v4-ethereum | 0xec71...17e0 | 0.03193495203 |
| RNG / GRT 0.3% | uniswap_v3 | 0xd17b...cbde | 0.17720210574455 |
| GRT / USDT | uniswap_v2 | 0x6476...47ad | 0.02712860056 |
| GRT / WETH 0.15% | balancer_ethereum | 0x89ea...4472 | 0.03891069218 |
| GRT / DAI | uniswap_v2 | 0x7c62...8f92 | 0.03069764769 |
| GRT / LINK 1% | uniswap_v3 | 0xeb5c...6267 | 0.08472492595 |
| GRT / USDT 1% | uniswap_v3 | 0x06b2...a5e9 | 0.223570471322998 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.