Metafora
0x155a9a01bc81c77f4a237a5ac731e702003bcb30
_hello there. Can anyone advice how fees are working for liquidity providers on quickswap - at a glance it`s only dquicks visible. Furthermore how to reveal contract name by contract bumber In particular below contract:
0x2D0d6725cc8feFc6eABcf2581867861F5E7A9288
Thanks in advance.
Reply 2 Link
@0xe0aac13ae07a44794815c1ff003d1c0ecb05998e watch out for 0x2D0d6725cc8feFc6eABcf2581867861F5E7A9288 , it is a scam contract from immitation website muskmetaverse.me . Stole my crypto. Authorizes random coin each time and promises a fake airdrop. Watch out, and de-authorize all your authorizations, as they will steal your currency not immediately but after some time so you won't notice.
Reply 3 Link

A project of Million Token. FAQ