| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZIK / WBTC 1% | uniswap-v4-ethereum | 0x42de...c25c | 0.000109185496 |
| ZIK / ETH 1% | uniswap-v4-ethereum | 0xd1ad...f535 | 0.0001073938644 |
| ZIK / WETH 1% | uniswap_v3 | 0x84fd...bd5a | 0.0001076630566 |
| ZIK / WBTC 1% | pancakeswap-v3-ethereum | 0xba4e...07fa | 0.0001119831245 |
| ZIK / USDC 1% | pancakeswap-v3-ethereum | 0x0115...1b27 | 0.0001076341029 |
| ZIK / WETH | uniswap_v2 | 0x7640...2dbe | 0.0001076851329 |
| ZIK / USDT 1% | uniswap_v3 | 0xd793...db71 | 0.0001072846624 |
| XAUt / ZIK | uniswap_v2 | 0x5f4f...653a | 0.000108056536445782 |
| OKB / ZIK 1% | uniswap-v4-ethereum | 0x69b2...bada | 0.000107778848289559 |
| ZIK / WBTC | uniswap_v2 | 0x0f74...e7b1 | 0.0001101675365 |
| ZIK / WETH 1% | pancakeswap-v3-ethereum | 0xeaaf...02a6 | 0.0001076095598 |
| ZIK / Cake 1% | pancakeswap-v3-ethereum | 0x1ba0...88f4 | 0.0001126764064 |
| ZIK / UNI 1% | uniswap_v3 | 0x7cfc...f224 | 0.0001089632198 |
| ZIK / USDT | uniswap_v2 | 0x6441...d0de | 0.000107640944 |
| ZIK / UNI 1% | uniswap-v4-ethereum | 0x6b31...5c29 | 0.000112089053 |
| ZIK / WBTC 1% | uniswap_v3 | 0xf3ce...b21b | 0.0001126980829 |
| ZIK / WBTC 0.3% | uniswap-v4-ethereum | 0x201f...19d0 | 0.0001123577884 |
| EUROC / ZIK 1% | uniswap-v4-ethereum | 0x3584...15df | 0.000107335788990775 |
| ZIK / SLVon 1% | uniswap-v4-ethereum | 0xaca7...a2cd | 0.0001074943605 |
| cbBTC / ZIK 1% | uniswap-v4-ethereum | 0x47d5...8931 | 0.000117062434045238 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.