| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| QORPO / ETH 20% | uniswap-v4-ethereum | 0xbc54...bc65 | 0.00335337637591859 |
| QORPO / USDC 95.51% | uniswap-v4-ethereum | 0x8d7f...5eff | 0.004708951682 |
| QORPO / USDC 23% | uniswap-v4-ethereum | 0x351c...0865 | 0.00308450011571801 |
| QORPO / USDT 60% | uniswap-v4-ethereum | 0xcc14...abea | 0.002241750404 |
| QORPO / USDC 99.991% | uniswap-v4-ethereum | 0x6959...66ed | 0.003475927715 |
| QORPO / USDC 99.511% | uniswap-v4-ethereum | 0xeb4c...9bfa | 0.004727143113 |
| QORPO / USDC 99.992% | uniswap-v4-ethereum | 0x4735...db67 | 0.003192863611 |
| QORPO / USDC 95.5% | uniswap-v4-ethereum | 0x82b7...e096 | 0.004661325495 |
| QORPO / USDC 91% | uniswap-v4-ethereum | 0xeea6...0e39 | 0.002929287452 |
| QORPO / ETH 75% | uniswap-v4-ethereum | 0xb2e1...3199 | 0.004208068059 |
| QORPO / USDC 12.9% | uniswap-v4-ethereum | 0x1b0b...dd96 | 0.006764056365 |
| QORPO / USDC 74.7% | uniswap-v4-ethereum | 0xc81c...9e0b | 0.005904595759 |
| QORPO / USDC 55.886% | uniswap-v4-ethereum | 0x9179...109d | 0.002069078419 |
| QORPO / USDT 72.59% | uniswap-v4-ethereum | 0x5aa2...9d20 | 0.003369939999 |
| QORPO / USDC 88% | uniswap-v4-ethereum | 0x913d...18c0 | 0.04417582156 |
| QORPO / USDC 99.998% | uniswap-v4-ethereum | 0xf5f9...5c28 | 0.004995351576 |
| QORPO / USDC 24.55% | uniswap-v4-ethereum | 0x43c9...ff54 | 0.003421722605 |
| QORPO / USDT 99.993% | uniswap-v4-ethereum | 0xdc79...3d5f | 0.002468020166 |
| QORPO / USDC 95.316% | uniswap-v4-ethereum | 0x1093...cbc0 | 0.003135220128 |
| QORPO / USDC 20.265% | uniswap-v4-ethereum | 0x1af7...dbef | 0.006037009823 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.