| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ZRX / WETH 0.3% | uniswap_v3 | 0x1442...8539 | 0.10600058469934 |
| ZRX / WETH | uniswap_v2 | 0xc6f3...6de4 | 0.106407089047913 |
| ZRX / ETH 0.3% | uniswap-v4-ethereum | 0x69a6...afbf | 0.104515043296251 |
| ZRX / USDT | uniswap_v2 | 0x0555...dd92 | 0.105684335822154 |
| ZRX / WETH | sushiswap | 0x0bc5...bdc8 | 0.105288033482934 |
| ZRX / ETH | uniswap-v4-ethereum | 0x308e...6617 | 0.106410505197915 |
| BAA / ZRX 0.3% | uniswap-v4-ethereum | 0x8d6e...a722 | 0.108736802936945 |
| ZRX / WETH 0.2% | balancer_ethereum | 0xea88...d863 | 0.10434557982782 |
| ZRX / DAI | uniswap_v2 | 0x7808...2513 | 0.111096445225889 |
| ICHI / ZRX 0.3% | uniswap_v3 | 0x28c7...ead0 | 0.191361535125457 |
| RNG / ZRX 0.3% | uniswap_v3 | 0xfa97...f042 | 0.296824562390931 |
| JJB / ZRX 0.05% | uniswap-v4-ethereum | 0xc37b...a5ff | 0.2311171554 |
| ETHMNY / ZRX | uniswap_v2 | 0x88e1...bb2d | 0.1307772706 |
| KNC / ZRX | uniswap_v2 | 0x79cd...3710 | 0.13258759513363 |
| SHIB / ZRX | shibaswap | 0xc3f1...d901 | 0.1310160615 |
| BEARDY / ZRX 1% | uniswap-v4-ethereum | 0x71dc...1af5 | 0.1425050205 |
| ZRX / USDC | uniswap_v2 | 0x9f65...14a0 | 0.127020976521583 |
| CAPC / ZRX | uniswap_v2 | 0x0b62...3a37 | 0.1374396459 |
| CRV / ZRX | sushiswap | 0x06aa...31f9 | 0.1441669183 |
| TONCOIN / ZRX 1% | uniswap_v3 | 0x9b8c...0b2d | 0.892722333010536 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.