| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LQTY / WETH 0.3% | uniswap_v3 | 0xd1d5...c44e | 0.421385304362081 |
| LQTY / USDC 1% | uniswap-v4-ethereum | 0x0acc...afdd | 0.416781209692246 |
| LQTY / DAI 1% | uniswap_v3 | 0x72d3...436d | 0.419928903128332 |
| LQTY / WETH | uniswap_v2 | 0xb132...6ea3 | 0.420948659220142 |
| LUSD / LQTY 0.3% | uniswap_v3 | 0xd251...1289 | 0.424889935995053 |
| LUSD / LQTY / WETH 0.3% | balancer_ethereum | 0x5512...4a50 | 0.425096710717661 |
| POOL / CREAM / HEGIC / LQTY / AXS / PERP / WETH / ALCX 2% | balancer_ethereum | 0xdb3e...5df3 | 0.6852056935 |
| LQTY / ETH 0.3% | uniswap-v4-ethereum | 0xce4a...d612 | 0.5374556892 |
| LQTY / WETH 1% | uniswap_v3 | 0x28b6...e58d | 0.3899570242 |
| LQTY / USDT 1% | uniswap_v3 | 0x86e2...16fc | 1.3765070627 |
| LQTY / WBTC 1% | uniswap_v3 | 0xefd7...7b7e | 0.8371642887 |
| LQTY / USDC 1% | uniswap_v3 | 0xc8f7...c9c2 | 0.470807061 |
| LQTY / USDT 0.3% | uniswap_v3 | 0xb9ec...467d | 0.4972676512 |
| LQTY / WETH | solidlydex | 0x1ea3...8dc3 | 0.3545042792 |
| LUSD / LQTY / rETH / WETH / RPL 6% | balancer_ethereum | 0xc445...1388 | 1.2364800962 |
| LUSD / LQTY 1% | uniswap_v3 | 0x9efd...1ef6 | 1.0548797114 |
| LQTY / WBTC 0.05% | uniswap_v3 | 0x943c...ce81 | 1.494809515 |
| LQTY / CRV 0.3% | uniswap_v3 | 0xd4cd...7b98 | 1.3766413166 |
| LQTY / KABOSU | uniswap_v2 | 0xe98e...6b1a | 0.365206868 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.