| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STRK / WETH 1% | uniswap_v3 | 0xac4f...6751 | 0.0512632298696657 |
| STRK / WETH | uniswap_v2 | 0x311c...d4da | 0.0510138817244865 |
| USDC / STRK 3% | uniswap-v4-ethereum | 0xb440...59c1 | 0.0524497427916124 |
| STRK / ETH 2% | uniswap-v4-ethereum | 0xc664...7f1e | 0.0523299759688876 |
| ZK / STRK 1% | uniswap-v4-ethereum | 0x677f...72f5 | 0.0509223570414162 |
| STRK / ETH 1% | uniswap-v4-ethereum | 0x7e5e...3c26 | 0.0516880956987221 |
| STRK / USDT 88% | uniswap-v4-ethereum | 0x5431...1f48 | 0.0456859434840694 |
| STRK / XPR 1% | uniswap_v3 | 0xe22e...2e37 | 0.05010255443 |
| STRK / USDT 50% | uniswap-v4-ethereum | 0xdd28...83c5 | 0.0502384671 |
| USDC / STRK 50% | uniswap-v4-ethereum | 0x03f0...44c3 | 0.0472587622840831 |
| USDC / STRK 1% | uniswap-v4-ethereum | 0x49d9...94c7 | 0.0529517936270059 |
| STRK / ETH 50% | uniswap-v4-ethereum | 0x7a8f...45e1 | 0.06531597089 |
| STRK / UNI 0.3% | uniswap-v4-ethereum | 0x70e2...a4b2 | 0.1798991505 |
| STRK / USDT 0.3% | uniswap-v4-ethereum | 0xf9b8...3a44 | 0.179817814366898 |
| USDC / STRK 2% | uniswap-v4-ethereum | 0x7a9d...888c | 0.0727115993 |
| LPT / STRK 0.3% | uniswap-v4-ethereum | 0xab7e...8e54 | 0.0478650259535035 |
| USDC / STRK 0.3% | uniswap-v4-ethereum | 0xf78c...745c | 0.1907326299 |
| STRK / ETH 0.3% | uniswap-v4-ethereum | 0x98fa...d13d | 0.1279789915 |
| USDC / STRK 1% | uniswap_v3 | 0x472f...ec53 | 0.08489223807 |
| USDC / STRK | uniswap_v2 | 0x43c5...f20a | 0.690538909998891 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.