| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| zkBTC / USDT 0.3% | uniswap_v3 | 0xbda0...ed00 | 101196.20669557 |
| zkBTC / WBTC 0.05% | uniswap_v3 | 0x95e6...fe69 | 66470.3211054269 |
| zkBTC / L2T 0.05% | uniswap_v3 | 0x7c76...0708 | 72273.4000301054 |
| zkBTC / USDT 0.3% | uniswap-v4-ethereum | 0x99ea...7d8a | 116277.992240013 |
| zkBTC / L2T 0.3% | uniswap_v3 | 0xf874...56b2 | 113873.879850295 |
| zkBTC / L2T 1% | uniswap_v3 | 0xc6b8...cca8 | 108310.854971654 |
| zkBTC / cbBTC / WBTC | curve | 0x8e5d...a613 | 112937.339880439 |
| zkBTC / crvUSD | curve | 0xc1dc...5d85 | 116257.70318936 |
| zkBTC / cbBTC / WBTC | curve | 0x6c49...f567 | 112066.267346173 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.