| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZENT / USDT 29% | uniswap-v4-ethereum | 0x0a23...0c19 | 0.0000000000000000001033409276 |
| ZENT / USDT 19% | uniswap-v4-ethereum | 0x186a...f6b6 | 0.000000000000059114742 |
| ZENT / USDC 95.3% | uniswap-v4-ethereum | 0xe45a...3f1d | 0.00000003722105976 |
| ZENT / USDT 0.3% | uniswap_v3 | 0x2404...64d7 | 0.004394702663 |
| ZENT / USDT 52% | uniswap-v4-ethereum | 0x61bb...4bf9 | 0.0000000000000000001069359693 |
| ZENT / USDT 51% | uniswap-v4-ethereum | 0x7c8d...9c0c | 0.0000000000000000002460855137 |
| ZENT / USDT 0.05% | uniswap_v3 | 0x300b...3940 | 0.00770132548 |
| ZENT / USDT 69% | uniswap-v4-ethereum | 0xebad...4d98 | 0.00000000000000000009516491797 |
| ZENT / USDT 46% | uniswap-v4-ethereum | 0xfecb...e96a | 0.0000000000000000000884686498 |
| ZENT / USDT 49% | uniswap-v4-ethereum | 0xbaf4...819f | 0.0000000000000000001884317844 |
| ZENT / USDC 92.1% | uniswap-v4-ethereum | 0xd9f5...2b42 | 0.00000000000000000001433964496 |
| ZENT / USDT 89% | uniswap-v4-ethereum | 0xd86e...3b85 | 0.0000000000000000001010793683 |
| ZENT / USDT 45% | uniswap-v4-ethereum | 0x791f...c53c | 0.00000000000000000009739186274 |
| ZENT / USDT 28% | uniswap-v4-ethereum | 0x7dcb...bfbe | 0.0000000000000000001787937866 |
| ZENT / USDT 25% | uniswap-v4-ethereum | 0xb448...ee64 | 0.00000000000002045782407 |
| ZENT / ETH 51% | uniswap-v4-ethereum | 0xae39...06e3 | 0.0000000000000000002390527125 |
| ZENT / USDT 79% | uniswap-v4-ethereum | 0x79b6...84b7 | 0.00000000000000000001974768769 |
| ZENT / USDC 50% | uniswap-v4-ethereum | 0x0f54...dcc6 | 0.0000000000000000007142102732 |
| ZENT / USDT 53% | uniswap-v4-ethereum | 0x2388...1b76 | 0.0000000000000000001502952086 |
| ZENT / ETH 52% | uniswap-v4-ethereum | 0x8fa8...9c9e | 0.0000000000000000002050306671 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.