| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PRQ / WETH | uniswap_v2 | 0x64ca...b0d1 | 0.000822323110982658 |
| SOTU / PRQ | uniswap_v2 | 0x134e...54e5 | 0.000812898619813981 |
| PRQ / WETH 1% | uniswap_v3 | 0xa34f...a7b5 | 0.0890633375 |
| PRQ / USDT 2% | uniswap-v4-ethereum | 0x1b57...ff88 | 0.05732987638 |
| PRQ / USDT 1% | uniswap_v3 | 0x0959...fcfc | 0.3704084353 |
| PRQ / REACT 0.3% | uniswap-v4-ethereum | 0xac44...b872 | 0.02039931672 |
| PRQ / USDC 0.01% | uniswap_v3 | 0x17ff...1cbc | 0.0269221125 |
| PRQBOOST / PRQ | uniswap_v2 | 0x4e58...ff01 | 0.000890021952401671 |
| PRQ / ETH 0.3% | uniswap-v4-ethereum | 0x559f...b008 | 0.0748521297 |
| PRQ / WETH 0.3% | uniswap_v3 | 0x1ee9...2f6d | 0.205204681 |
| PRQ / KABOSU | uniswap_v2 | 0xba3f...be73 | 0.1783231182 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.