Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GTC / WETH 0.3% | uniswap_v3 | 0xd017...47b2 | 0.314984357074164 |
GTC / WETH | uniswap_v2 | 0xa350...7da8 | 0.313710388675494 |
GTC / WETH 0.15% | balancer_ethereum | 0xff08...be88 | 0.310908854812706 |
GTC / WETH 1% | uniswap_v3 | 0x06b1...72fe | 0.315646440681668 |
AAVE / BAL / RARE / ENS / RPL / GTC / HAUS / ROBOT 0.42% | balancer_ethereum | 0x20fa...5233 | 166.556264716817 |
GTC / ETH 1% | uniswap-v4-ethereum | 0x6c6e...6dc3 | 0.315215033852833 |
GTC / DAI 0.3% | uniswap_v3 | 0xfe43...4c1f | 1.47848081543429 |
GTC / USDC 0.3% | uniswap_v3 | 0x0eed...ec81 | 0.782728002605311 |
GTC / WETH 0.05% | uniswap_v3 | 0x60c5...b7c5 | 0.2683209251 |
GTC / USDT 0.3% | uniswap_v3 | 0x2a37...f4c0 | 4.39714300465094 |
GTC / USDC | sushiswap | 0x0446...874e | 0.3048639808 |
GTC / USDC 1% | uniswap_v3 | 0x1ad9...8592 | 0.8401010704 |
KABOSU / GTC | uniswap_v2 | 0xeb96...0587 | 0.3370027604 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.