| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZINU / WETH | uniswap_v2 | 0xfcad...a456 | 0.0000000001773158053 |
| ZINU / WETH 0.3% | uniswap_v3 | 0x42b1...262b | 0.00000000000000000000000000000000000000000000526769389166965 |
| BONE / ZINU | shibaswap | 0x9cdd...7833 | 0.0000000001762826789 |
| ZINU / WETH | sushiswap | 0x77be...2b9b | 0.0000000001625913906 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.