Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ZIK / WETH 1% | uniswap_v3 | 0x84fd...bd5a | 0.000155566734573557 |
ZIK / USDC 1% | pancakeswap-v3-ethereum | 0x0115...1b27 | 0.000157880744969064 |
ZIK / WETH 1% | pancakeswap-v3-ethereum | 0xeaaf...02a6 | 0.000156517929265813 |
WLD / ZIK 1% | uniswap_v3 | 0x0f21...9801 | 0.00015898310132287 |
FLOKI / ZIK 1% | uniswap_v3 | 0x6199...565c | 0.000155910686260292 |
ZIK / USDT 1% | sushiswap-v3-ethereum | 0x5422...7a3f | 0.000156846777555363 |
ZIK / WETH | uniswap_v2 | 0x7640...2dbe | 0.00015529950866815 |
ZIK / SUSHI 1% | sushiswap-v3-ethereum | 0x01b9...c52f | 0.00015738501700711 |
ZIK / WBTC 1% | pancakeswap-v3-ethereum | 0xba4e...07fa | 0.000156803262177711 |
ZIK / UNI 1% | uniswap_v3 | 0x7cfc...f224 | 0.000157238336731928 |
ZIK / WBTC 1% | uniswap_v3 | 0xf3ce...b21b | 0.00015662284564237 |
ZIK / USDT 1% | uniswap_v3 | 0xd793...db71 | 0.000155807985091608 |
CVC / ZIK 1% | uniswap_v3 | 0x4194...663a | 0.000156325618630588 |
1INCH / ZIK 1% | uniswap_v3 | 0xc95e...7194 | 0.000156626338284024 |
ZIK / LINK 1% | uniswap_v3 | 0xeafe...a28b | 0.00015730190480517 |
ZIK / ONDO 1% | uniswap_v3 | 0xda86...7a28 | 0.00015704552325548 |
TON / ZIK 1% | uniswap_v3 | 0x78ef...c2eb | 0.000159038165184325 |
PEPE / ZIK 1% | pancakeswap-v3-ethereum | 0x8c77...ece4 | 0.000157247825567792 |
ZIK / USDC 1% | sushiswap-v3-ethereum | 0x208d...2f50 | 0.000156954110156219 |
PEPE / ZIK 1% | uniswap_v3 | 0xf782...76aa | 0.000158641723316903 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.