| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| QAI / USDT 88% | uniswap-v4-ethereum | 0x8d22...4f83 | 66.6649093871 |
| QAI / USDT 86% | uniswap-v4-ethereum | 0x906f...42c1 | 66.7865807233 |
| USDC / QAI 98.8% | uniswap-v4-ethereum | 0x42bb...a915 | 1.590224034 |
| QAI / USDC 85.02% | uniswap-v4-ethereum | 0xd0c7...0b6c | 37.5277689405 |
| USDC / QAI 85.1% | uniswap-v4-ethereum | 0x108e...a25b | 7.0179595289 |
| USDC / QAI 60% | uniswap-v4-ethereum | 0x3658...a605 | 53.4093532702 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.