| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| EURQ / USDT 0.05% | uniswap_v3 | 0x5a18...e945 | 1.19987134932469 |
| EUROC / EURS / EURQ | curve | 0x48ed...63d4 | 1.19296715905658 |
| EURQ / DUSK 0.3% | uniswap_v3 | 0xc66b...b563 | 1.1536752236 |
| XAUt / EURQ 0.05% | uniswap_v3 | 0x8ab9...3547 | 1.16965828714135 |
| XAUt / EURQ 0.3% | uniswap_v3 | 0x08a5...3716 | 1.2025308549 |
| EURQ / WETH 0.01% | uniswap_v3 | 0x2f7c...ec99 | 1.182445653 |
| EURQ / EURT 0.05% | uniswap_v3 | 0xa28a...3280 | 1.1567526969 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.