| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CQT / USDC | sushiswap | 0x1789...d4a5 | 0.0004574776373 |
| CQT / WETH 1% | uniswap_v3 | 0xc140...7d8c | 0.06497906692 |
| CQT / USDT | sushiswap | 0x0453...9fc4 | 0.0003475207546 |
| CQT / WETH | sushiswap | 0x6663...8f30 | 0.0004291651078 |
| NFAi / CQT | uniswap_v2 | 0xbc2c...8e89 | 0.00473143785239916 |
| CQT / WETH | uniswap_v2 | 0xb69e...33bd | 0.000114946593 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.