| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZK / USDT | dodo-pmm-ethereum | 0xb5d6...2930 | 0.01140571185 |
| ZK / ETH 50% | uniswap-v4-ethereum | 0xd205...58f4 | 0.01157663204 |
| ZK / USDT 5% | uniswap-v4-ethereum | 0xd99d...94e7 | 0.1514282284 |
| USDC / ZK 5% | uniswap-v4-ethereum | 0x2b13...d37c | 0.3421663894 |
| ZK / ETH 88.8% | uniswap-v4-ethereum | 0xabe4...22a3 | 0.08802827101 |
| ZK / USDT 78% | uniswap-v4-ethereum | 0x8e26...3e9d | 0.1289406781 |
| ZK / WETH 1% | uniswap_v3 | 0xa3c6...3a72 | 1.1837021111 |
| ZK / USDT 88% | uniswap-v4-ethereum | 0x6c59...ce2f | 0.009729482018 |
| USDC / ZK 87% | uniswap-v4-ethereum | 0x7c8c...b588 | 0.009216664857 |
| ZK / USDC 95.4% | uniswap-v4-ethereum | 0x1a7f...a0b4 | 0.01334441711 |
| ZK / USDT 0.3% | uniswap_v3 | 0xb243...ad1f | 1.0031374465 |
| ZK / ETH 0.01% | uniswap-v4-ethereum | 0x78d9...2f1d | 0.01619078889 |
| ZK / ETH 2% | uniswap-v4-ethereum | 0xf4d9...3225 | 2.0111097382 |
| ZK / WETH 0.3% | uniswap_v3 | 0x7dee...1e2b | 1.4548434748 |
| USDC / ZK 1% | uniswap_v3 | 0xae8b...e87b | 1.27334807597551 |
| ZK / KABOSU | uniswap_v2 | 0xe53c...a0e1 | 1.9892624491 |
| ZK / ETH 0.05% | uniswap-v4-ethereum | 0x9919...d6ab | 0.3590449255 |
| USDC / ZK 1% | uniswap-v4-ethereum | 0x834a...0177 | 0.1655666662 |
| USDC / ZK 3% | uniswap-v4-ethereum | 0x8c23...42f0 | 0.368521234 |
| ZK / USDT 0.3% | uniswap-v4-ethereum | 0x417c...a025 | 0.3099591801 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.