| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| QORPO / USDC 25.55% | uniswap-v4-ethereum | 0x26c5...f771 | 0.00466926208125114 |
| QORPO / USDC 99.991% | uniswap-v4-ethereum | 0x6959...66ed | 0.003475927715 |
| QORPO / USDC 74.7% | uniswap-v4-ethereum | 0xc81c...9e0b | 0.005904595759 |
| QORPO / USDC 99.993% | uniswap-v4-ethereum | 0xe798...1211 | 0.003021125094 |
| QORPO / USDC 99.992% | uniswap-v4-ethereum | 0x4735...db67 | 0.003192863611 |
| QORPO / USDC 91% | uniswap-v4-ethereum | 0xeea6...0e39 | 0.002929287452 |
| QORPO / ETH 75% | uniswap-v4-ethereum | 0xb2e1...3199 | 0.004208068059 |
| QORPO / USDC 55.89% | uniswap-v4-ethereum | 0x060d...8fc9 | 0.00346743948 |
| QORPO / USDC 55.886% | uniswap-v4-ethereum | 0x9179...109d | 0.002069078419 |
| QORPO / USDT 72.59% | uniswap-v4-ethereum | 0x5aa2...9d20 | 0.003369939999 |
| QORPO / USDC 88% | uniswap-v4-ethereum | 0x913d...18c0 | 0.04417582156 |
| QORPO / USDC 99.998% | uniswap-v4-ethereum | 0xf5f9...5c28 | 0.004995351576 |
| QORPO / USDC 95.316% | uniswap-v4-ethereum | 0x1093...cbc0 | 0.003135220128 |
| QORPO / USDC 80% | uniswap-v4-ethereum | 0xe50d...fed2 | 0.001599393141 |
| QORPO / USDC 79.7% | uniswap-v4-ethereum | 0x58cd...92df | 0.002646645179 |
| QORPO / USDC 20% | uniswap-v4-ethereum | 0x7ed5...0303 | 0.00703807250357957 |
| QORPO / USDC 94.98% | uniswap-v4-ethereum | 0x4c1e...075c | 0.0004078325039 |
| QORPO / USDT 94.99% | uniswap-v4-ethereum | 0xc121...e56f | 0.0004215322784 |
| QORPO / ETH 1% | uniswap-v4-ethereum | 0xd27b...4221 | 0.00546317353 |
| QORPO / USDC 55.888% | uniswap-v4-ethereum | 0x03e6...3339 | 0.00355261748 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.