Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ZIK / USDC 1% | pancakeswap-v3-ethereum | 0x0115...1b27 | 0.000121297099364596 |
ZIK / WETH 1% | uniswap_v3 | 0x84fd...bd5a | 0.000121349238810553 |
ZIK / Cake 1% | pancakeswap-v3-ethereum | 0x1ba0...88f4 | 0.0001216609801086 |
ZIK / WBTC 1% | pancakeswap-v3-ethereum | 0xba4e...07fa | 0.000122254520200555 |
ZIK / SUSHI 1% | sushiswap-v3-ethereum | 0x01b9...c52f | 0.000120278992616411 |
ZIK / WETH 1% | pancakeswap-v3-ethereum | 0xeaaf...02a6 | 0.00012124424781343 |
ZIK / WETH | uniswap_v2 | 0x7640...2dbe | 0.000122183200538985 |
ZIK / USDT 1% | uniswap_v3 | 0xd793...db71 | 0.000121234830977998 |
WLD / ZIK 1% | uniswap_v3 | 0x0f21...9801 | 0.000121069754505141 |
ZIK / ONDO 1% | uniswap_v3 | 0xda86...7a28 | 0.000120710047852805 |
ZIK / NEIRO 1% | uniswap_v3 | 0x11e9...4d41 | 0.000121294247685646 |
FLOKI / ZIK 1% | uniswap_v3 | 0x6199...565c | 0.00011974802664413 |
ZIK / WBTC 1% | uniswap_v3 | 0xf3ce...b21b | 0.000121784445179666 |
ZIK / LINK 1% | uniswap_v3 | 0xeafe...a28b | 0.000120920034016512 |
ZIK / WBTC 1% | sushiswap-v3-ethereum | 0x6882...de7d | 0.000122805142104971 |
CVC / ZIK 1% | uniswap_v3 | 0x4194...663a | 0.00012568751518496 |
ZIK / USDC 1% | sushiswap-v3-ethereum | 0x208d...2f50 | 0.00012263723151419 |
1INCH / ZIK 1% | uniswap_v3 | 0xc95e...7194 | 0.000124474455294687 |
PEPE / ZIK 1% | pancakeswap-v3-ethereum | 0x8c77...ece4 | 0.000124346122415418 |
ZIK / USDT | uniswap_v2 | 0x6441...d0de | 0.000122648321724825 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.