| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZKC / USDC 0.96% | uniswap-v4-ethereum | 0x39d8...7872 | 0.06957945034 |
| ZKC / USDT 10% | uniswap-v4-ethereum | 0xd1d1...6731 | 0.06715369993 |
| ZKC / USDT 70% | uniswap-v4-ethereum | 0x4f04...3014 | 0.0936460095 |
| ZKC / USDC 0.909% | uniswap-v4-ethereum | 0xefa8...2960 | 0.8600955755 |
| ZKC / USDT 3% | uniswap-v4-ethereum | 0xbe0a...6c21 | 0.149327805 |
| ZKC / USDC 0.923% | uniswap-v4-ethereum | 0x0746...d715 | 0.748127884 |
| ZKC / USDC 0.91% | uniswap-v4-ethereum | 0xeeca...19b9 | 0.7882730732 |
| ZKC / ETH 1.01% | uniswap-v4-ethereum | 0xd7a7...43e4 | 1.4899585524 |
| ZKC / ETH 1% | uniswap-v4-ethereum | 0x09ed...e5b7 | 0.06831110582 |
| ZKC / USDC 3% | uniswap-v4-ethereum | 0xe73d...80d2 | 1.1908252995 |
| ZKC / USDT 1% | uniswap-v4-ethereum | 0x56b4...f505 | 0.8706006966 |
| ZKC / USDT 0.899% | uniswap-v4-ethereum | 0x2adc...942e | 0.09937810599 |
| ZKC / USDC 0.85% | uniswap-v4-ethereum | 0x7f84...3115 | 1.2234681978 |
| ZKC / USDT 0.95% | uniswap-v4-ethereum | 0x6f28...5fdf | 1.5666644859 |
| ZKC / ETH 4.6% | uniswap-v4-ethereum | 0xb0a1...9c80 | 0.1181404163 |
| ZKC / USDC 10% | uniswap-v4-ethereum | 0xd4e7...16c1 | 0.9306974274 |
| ZKC / USDT 0.9% | uniswap-v4-ethereum | 0xacfc...d252 | 0.07607844719 |
| ZKC / USDC 2.5% | uniswap-v4-ethereum | 0x7fb5...9d03 | 1.2291868302 |
| ZKC / USDC 5.1% | uniswap-v4-ethereum | 0xa8c0...da7a | 1.9171022228 |
| ZKC / ETH 89% | uniswap-v4-ethereum | 0x77bb...4f6f | 0.627223032 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.