| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| AQT / ETH 70% | uniswap-v4-ethereum | 0xa8ff...681a | 0.2526921274 |
| AQT / ETH 70% | uniswap-v4-ethereum | 0xdf53...c980 | 1.0127740749 |
| AQT / ETH 90% | uniswap-v4-ethereum | 0x9814...1114 | 0.2361655694 |
| AQT / USDC 88% | uniswap-v4-ethereum | 0x4c78...8426 | 0.1108892234 |
| AQT / ETH 80% | uniswap-v4-ethereum | 0x8144...26f0 | 37.8129188954 |
| AQT / USDT 90% | uniswap-v4-ethereum | 0xfa9e...8878 | 9.3903821837 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.