| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EURQ / USDT 0.05% | uniswap_v3 | 0x5a18...e945 | 1.17084952342315 |
| EUROC / EURS / EURQ | curve | 0x48ed...63d4 | 1.16214216721942 |
| EURQ / DUSK 0.3% | uniswap_v3 | 0xc66b...b563 | 1.0401727736 |
| EURQ / WETH 0.01% | uniswap_v3 | 0x2f7c...ec99 | 1.182445653 |
| XAUt / EURQ 0.05% | uniswap_v3 | 0x8ab9...3547 | 1.1571450931 |
| XAUt / EURQ 0.3% | uniswap_v3 | 0x08a5...3716 | 1.2025308549 |
| EURQ / EURT 0.05% | uniswap_v3 | 0xa28a...3280 | 1.1567526969 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.