Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
LQTY / WETH 0.3% | uniswap_v3 | 0xd1d5...c44e | 0.722034989892791 |
LQTY / WETH | uniswap_v2 | 0xb132...6ea3 | 0.730375452047299 |
LQTY / USDT 0.3% | uniswap_v3 | 0xb9ec...467d | 0.711806969415842 |
LUSD / LQTY 0.3% | uniswap_v3 | 0xd251...1289 | 0.739201390809474 |
YGG / MPL / MULTI / LQTY 10% | balancer_ethereum | 0xd18f...2d7f | 0.309725839233902249432852529108 |
LQTY / WETH 1% | uniswap_v3 | 0x28b6...e58d | 1.0299949373 |
LQTY / USDT 1% | uniswap_v3 | 0x86e2...16fc | 0.4634502109 |
tBTC / LQTY 0.3% | uniswap_v3 | 0x2ec2...bcf4 | 1.2278953918 |
LQTY / WBTC 1% | uniswap_v3 | 0xefd7...7b7e | 0.8371642887 |
LUSD / LQTY / WETH 0.3% | balancer_ethereum | 0x5512...4a50 | 0.627228481 |
RNG / LQTY 0.3% | uniswap_v3 | 0x53c1...79dc | 0.711127715676083 |
LQTY / USDC 1% | uniswap_v3 | 0xc8f7...c9c2 | 1.4967650181 |
LUSD / LQTY 0.05% | uniswap_v3 | 0x29b6...9187 | 0.839243787923554 |
POOL / CREAM / HEGIC / LQTY / AXS / PERP / WETH / ALCX 2% | balancer_ethereum | 0xdb3e...5df3 | 0.6852056935 |
LUSD / LQTY / rETH / WETH / RPL 6% | balancer_ethereum | 0xc445...1388 | 0.9722505066 |
LQTY / WETH | solidlydex | 0x1ea3...8dc3 | 6.96135550946637 |
LQTY / USDC 0.3% | uniswap_v3 | 0x97d0...d37d | 1.37306284002686 |
LQTY / CRV 1% | uniswap_v3 | 0x3e93...7c5e | 0.739637953151308374730830606 |
LQTY / WBTC 0.3% | uniswap_v3 | 0xc256...a487 | 0.7396412291367049559716808835 |
LUSD / LQTY 1% | uniswap_v3 | 0x9efd...1ef6 | 1.0548797114 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.