| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WZEC / USDC | sushiswap | 0x7212...5c6b | 326.5865938885 |
| WZEC / USDC | uniswap_v2 | 0x2590...9e5e | 340.5955451253 |
| WZEC / WBTC 1% | uniswap-v4-ethereum | 0xdf69...8317 | 508.4596972063 |
| WZEC / WETH | sushiswap | 0xc99c...ee7b | 236.6632271654 |
| WZEC / USDC 0.3% | uniswap_v3 | 0x0ed1...1c5d | 79.95301586484906605794200229035968731249669684 |
| WZEC / ARB 1% | uniswap-v4-ethereum | 0xa745...9a2e | 324.7793821489 |
| WZEC / USDC 1% | uniswap-v4-ethereum | 0xe4e2...a26f | 323.4053717134 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.