Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GOU / WETH | uniswap_v2 | 0x5694...897e | 0.0000662901789698165 |
GOU / WETH 1% | uniswap_v3 | 0x3621...482e | 0.0138528586364956 |
BABYNEIRO / GOU 1% | uniswap_v3 | 0x6661...4b26 | 0.000390549366791087 |
NFAi / GOU 1% | uniswap_v3 | 0xe409...e9df | 0.00625854216821618 |
GOU / WETH 0.3% | uniswap_v3 | 0x0bb8...0f39 | 0.0114558988921736 |
Neiro / GOU | uniswap_v2 | 0xba26...7ebf | 0.00748873384021358 |
n / GOU 1% | uniswap_v3 | 0x40bc...d961 | 0.00209004294589961 |
n / GOU | uniswap_v2 | 0x8258...24a6 | 0.00131015492956839 |
NFAi / GOU | uniswap_v2 | 0x1415...9c99 | 0.001370054778 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.