| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| IQ / FRAX | fraxswap_ethereum | 0x07af...94f8 | 0.0017653685683126 |
| IQ / WETH | sushiswap | 0x9d45...e274 | 0.00175749273347345 |
| frxETH / IQ | curve | 0xa795...55cb | 0.00174844644321242 |
| IQ / FRAX | fraxswap_ethereum | 0xcb0b...42e9 | 0.00177288491744736 |
| IQ / FRAX | uniswap_v2 | 0xd6c7...9914 | 0.00175874246260578 |
| IQ / KABOSU | uniswap_v2 | 0x0f24...d8ef | 0.00176272750616789 |
| IQ / WETH | uniswap_v2 | 0xef9f...69d0 | 0.00174642651511834 |
| IQ / ETH 1% | uniswap-v4-ethereum | 0x6082...0ed4 | 0.003589795278 |
| BDG / IQ | uniswap_v2 | 0xe524...08b0 | 0.00182565346173339 |
| IQ / WETH 0.3% | sushiswap-v3-ethereum | 0xe500...c7fa | 0.004879720767 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.