| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| KNC / USDC / WETH 0.3% | balancer_ethereum | 0x6f0e...e0ca | 0.2387636848 |
| USDT / KNC 0.3% | uniswap-v4-ethereum | 0x3add...9536 | 0.2435546731 |
| USDT / KNC 0.301% | uniswap-v4-ethereum | 0x1e61...18d3 | 0.247252761102263 |
| KNC / ETH 40% | uniswap-v4-ethereum | 0x2a69...3905 | 0.1342941387 |
| ZIK / KNC 1% | uniswap-v4-ethereum | 0x1f8d...94cb | 0.247809151771081 |
| KNC / KNC | kyberswap_classic_ethereum | 0xe294...4980 | 0.261098470453515 |
| USDC / KNC 20% | uniswap-v4-ethereum | 0x16b4...7604 | 0.180338126878162 |
| KNC / ETH 0.01% | uniswap-v4-ethereum | 0x14e2...1bc1 | 0.4503791498 |
| KNC / USDC 2% | kyberswap_elastic | 0x01cd...8312 | 0.2957457326 |
| KNC / WBTC 1% | kyberswap_elastic | 0xf097...0d92 | 0.3096530287 |
| KNC / WETH | sushiswap | 0xbdc1...6cc7 | 0.239939992236376 |
| UND / KNC | kyberswap_classic_ethereum | 0x38ff...4fdf | 0.568017886308388 |
| KNC / WETH | kyberswap_classic_ethereum | 0x6163...7759 | 0.5382130268 |
| USDT / KNC 0.01% | uniswap-v4-ethereum | 0x213e...d4cd | 0.3483103977 |
| KNC / WETH 0.01% | uniswap_v3 | 0x7fdd...1af5 | 0.3865655212 |
| KNC / WETH 1% | uniswap_v3 | 0xfdd2...7634 | 0.3870931993 |
| KNC / WETH 0.3% | uniswap_v3 | 0xae4e...8239 | 1.06380571786306 |
| KNC / WETH | uniswap_v2 | 0x1db6...7de7 | 0.0003104079972 |
| KABOSU / KNC | uniswap_v2 | 0x57b5...d9df | 0.2411700181 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.