| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GMEE / WETH | uniswap_v2 | 0x4c08...cc73 | 0.000851520677634746 |
| CTA / GMEE 0.3% | uniswap_v3 | 0x63ca...56c3 | 0.000855434339805738 |
| REVV / GMEE 0.3% | sushiswap-v3-ethereum | 0xf4ed...3178 | 0.000857860398151092 |
| MYTH / GMEE | uniswap_v2 | 0x65d0...43ed | 0.000857570152379738 |
| GMEE / STZ | sushiswap | 0x18ab...9ce9 | 0.000857570152379738 |
| GMEE / USDC 0.05% | uniswap_v3 | 0x0a6f...b872 | 0.009982073189 |
| TOWER / GMEE 0.3% | uniswap_v3 | 0x93db...9413 | 0.001708666013 |
| GMEE / USDC | uniswap_v2 | 0x5ed0...a57b | 0.0009605857274 |
| GMEE / REVV | sushiswap | 0xad7c...6be0 | 0.001012830701 |
| GMEE / BONDLY | sushiswap | 0x9c3e...f1c2 | 0.001012848778 |
| ASTRAFER / GMEE | sushiswap | 0x7bb1...aa58 | 0.001012926726 |
| BENJI / GMEE | sushiswap | 0xccd7...40e2 | 0.001027620117 |
| GMEE / TOWER | sushiswap | 0x4580...17cd | 0.001621434714 |
| GMEE / USDC 0.3% | uniswap_v3 | 0xe1fc...5b5b | 0.01491267380819938380991259867788 |
| GMEE / LMT | sushiswap | 0xcb39...586e | 0.00161243479 |
| PRIMATE / GMEE | sushiswap | 0x8c8f...ebc2 | 0.0009419449637 |
| GMEE / WETH | sushiswap | 0xf68d...a77a | 0.001975264459 |
| GMEE / PROS | sushiswap | 0x7836...7764 | 0.0200284695513711 |
| GMEE / WETH 0.3% | uniswap_v3 | 0xb0a1...f8a0 | 0.086059518004257 |
| QUIDD / GMEE | sushiswap | 0x3528...3b61 | 0.002579680633 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.