| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PNDC / WETH 1% | uniswap_v3 | 0xc643...4152 | 0.00000008778945245 |
| PNDC / PORK 1% | uniswap-v4-ethereum | 0xe8ea...ad38 | 0.00000008941509639 |
| PNDC / USDC 0.3% | uniswap_v3 | 0xfa9b...8207 | 0.00000008796730389 |
| PNDC / PORK 1% | uniswap_v3 | 0xc026...f365 | 0.00000008938927498 |
| PNDC / ETH 1% | uniswap-v4-ethereum | 0x4e3e...e7a2 | 0.00000008920426173 |
| PNDC / WETH | uniswap_v2 | 0x27b8...2a61 | 0.0000000886181141 |
| PNDC / DI 1% | uniswap_v3 | 0x4539...b490 | 0.00000008938927498 |
| PNDC / WETH | justmoney-ethereum | 0x54bf...b354 | 0.0000000892221401 |
| PNDC / DORKK | x7-finance | 0x4bad...9609 | 0.00000009474204125 |
| PNDC / PEPE | uniswap_v2 | 0x43f4...925d | 0.00000009474183113 |
| PNDC / Yee 1% | uniswap-v4-ethereum | 0xec36...2f4c | 0.00000009488347315 |
| PNDC / WETH | sushiswap | 0x33cf...7e09 | 0.00000009612976096 |
| PNDC / WETH 1% | pancakeswap-v3-ethereum | 0xde46...c419 | 0.00000009654609168 |
| PNDC / PEPE 1% | uniswap-v4-ethereum | 0x6f41...3ee4 | 0.0000000917360101 |
| PNDC / BEG | uniswap_v2 | 0xd906...2b4c | 0.00000009474183113 |
| PNDC / WETH | x7-finance | 0x7aea...40c1 | 0.00000009706739174 |
| WIGGER / PNDC | uniswap_v2 | 0xc342...6b3d | 0.0000000884871464030016 |
| PNDC / USDT | sushiswap | 0x1935...4e58 | 0.00000009185000088 |
| PNDC / USDT | uniswap_v2 | 0x2ec0...60ca | 0.00000009573125069 |
| PNDC / WETH 0.3% | uniswap_v3 | 0xa065...377c | 0.00000009434585786 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.