Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
QOM / WETH | uniswap_v2 | 0x8ef7...3462 | 0.0000000024062223851306 |
QOM / O / CAW | curve | 0x84ce...a178 | 0.0000000023840614927925 |
QOM / WETH | curve | 0x6853...1783 | 0.00000000233332153965919 |
QOM / O / CAW 1% | balancer_ethereum | 0xb704...858d | 0.000000002093365041 |
QOM / TREAT 1% | uniswap_v3 | 0xcca2...6b02 | 0.00000000244185473000686 |
QOM / WETH 1% | uniswap_v3 | 0x3c0b...3475 | 0.0000000005273221202 |
QOM / QOM2 | uniswap_v2 | 0x99ef...cdd6 | 0.000000003795729361 |
QOM / WQOM 0.3% | uniswap_v3 | 0x028c...fd93 | 0.00000000728090915601829 |
WQOM / QOM 1% | uniswap_v3 | 0x54f1...33f9 | 0.00000000653500441215656 |
QOM / O 1% | uniswap_v3 | 0x4d9f...f9b3 | 0.000000002299581502 |
STATE / QOM | uniswap_v2 | 0xb164...bb51 | 0.0000000259676406391784 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.