| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CQT / USDC | sushiswap | 0x1789...d4a5 | 0.000642993289823778 |
| CQT / WETH 1% | uniswap_v3 | 0xc140...7d8c | 0.0882573402 |
| CQT / WETH | sushiswap | 0x6663...8f30 | 0.000757241811210951 |
| CQT / USDT | sushiswap | 0x0453...9fc4 | 0.0005655054816 |
| CQT / WETH | uniswap_v2 | 0xb69e...33bd | 0.000002661919579 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.