| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZKC / USDT 10% | uniswap-v4-ethereum | 0xd1d1...6731 | 0.099184204523883 |
| ZKC / USDC 0.96% | uniswap-v4-ethereum | 0x39d8...7872 | 0.102568857771663 |
| ZKC / USDT 70% | uniswap-v4-ethereum | 0x4f04...3014 | 0.0936460095 |
| ZKC / USDC 0.909% | uniswap-v4-ethereum | 0xefa8...2960 | 0.8600955755 |
| ZKC / USDC 0.923% | uniswap-v4-ethereum | 0x0746...d715 | 0.748127884 |
| ZKC / USDT 3% | uniswap-v4-ethereum | 0xbe0a...6c21 | 0.1468016583 |
| ZKC / USDC 0.91% | uniswap-v4-ethereum | 0xeeca...19b9 | 0.7882730732 |
| ZKC / ETH 1.01% | uniswap-v4-ethereum | 0xd7a7...43e4 | 1.4899585524 |
| ZKC / ETH 1% | uniswap-v4-ethereum | 0x09ed...e5b7 | 0.106150312378404 |
| ZKC / USDC 3% | uniswap-v4-ethereum | 0xe73d...80d2 | 1.1908252995 |
| ZKC / USDT 1% | uniswap-v4-ethereum | 0x56b4...f505 | 0.8706006966 |
| ZKC / USDT 0.899% | uniswap-v4-ethereum | 0x2adc...942e | 0.09937810599 |
| ZKC / USDC 0.85% | uniswap-v4-ethereum | 0x7f84...3115 | 1.2234681978 |
| ZKC / USDT 0.95% | uniswap-v4-ethereum | 0x6f28...5fdf | 1.5666644859 |
| ZKC / ETH 4.6% | uniswap-v4-ethereum | 0xb0a1...9c80 | 0.1181404163 |
| ZKC / USDC 10% | uniswap-v4-ethereum | 0xd4e7...16c1 | 0.9306974274 |
| ZKC / USDC 2.5% | uniswap-v4-ethereum | 0x7fb5...9d03 | 1.2291868302 |
| ZKC / USDC 5.1% | uniswap-v4-ethereum | 0xa8c0...da7a | 1.9171022228 |
| ZKC / ETH 89% | uniswap-v4-ethereum | 0x77bb...4f6f | 0.627223032 |
| ZKC / ETH 5% | uniswap-v4-ethereum | 0xf23c...0f2d | 1.9309907231 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.