| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| QNT / WETH 0.3% | uniswap_v3 | 0x24ee...b9df | 70.25322343 |
| QNT / USDT 1% | uniswap_v3 | 0xde77...9162 | 70.5456435814 |
| QNT / WETH | uniswap_v2 | 0x0c4a...625e | 70.0570587806 |
| QNT / waEthLidowstETH 0.3% | balancer-v3-ethereum | 0x711a...a591 | 71.3667795901 |
| QNT / WBTC 0.3% | balancer-v3-ethereum | 0x571b...72dd | 70.8257026804 |
| QNT / ETH 1% | uniswap-v4-ethereum | 0x59af...bda4 | 70.1748349995 |
| QNT / USDC 0.3% | uniswap-v4-ethereum | 0xd574...991a | 70.3235253067 |
| QNT / ETH 0.3% | uniswap-v4-ethereum | 0xad6d...907d | 70.7053911365 |
| EWTB / QNT 0.3% | uniswap_v3 | 0xa44c...105c | 106.1487055502 |
| QNT / WETH | smardex-ethereum | 0x6ac3...64ad | 153.9200341924 |
| QNT / LINK 0.3% | uniswap-v4-ethereum | 0xf131...5c8f | 87.6887892722 |
| QNT / VVV | uniswap_v2 | 0x9c09...deaa | 68.7776207141 |
| QNT / MATIC 1% | uniswap_v3 | 0xd4c1...94d1 | 114.977580629852 |
| QNT / WBTC 1% | uniswap_v3 | 0x83dd...f701 | 215.8136937302 |
| QNT / USDC 0.3% | balancer_ethereum | 0xdbc4...54ae | 73.5031285126 |
| QNT / COMP 0.05% | uniswap_v3 | 0xd6fa...8f99 | 57.0211964989863 |
| QNT / DAI 1% | uniswap_v3 | 0x07e4...51c2 | 125.5211587531 |
| QNT / WETH 1% | uniswap_v3 | 0xe310...1162 | 149.2669721669 |
| QNT / USDC | uniswap_v2 | 0x46da...1837 | 72.0389802876 |
| QNT / LINK 1% | uniswap-v4-ethereum | 0x004d...258c | 93.2054232669 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.