| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| USDC / PORT3 45% | uniswap-v4-ethereum | 0x7e22...eb6c | 0.00000000000000000000409197986406529 |
| USDC / PORT3 44% | uniswap-v4-ethereum | 0xe6fd...64c0 | 0.0000000000000000000044575900477955 |
| USDC / PORT3 46% | uniswap-v4-ethereum | 0x0067...502a | 0.0000000000000000000134867457138032 |
| PORT3 / ETH 99.2% | uniswap-v4-ethereum | 0x85e2...27a7 | 0.00000000000195658522 |
| PORT3 / ETH 89.213% | uniswap-v4-ethereum | 0xa4be...0676 | 0.000000000000000000519597459 |
| PORT3 / USDT 99% | uniswap-v4-ethereum | 0xae02...36f9 | 0.000000000000000004841988392 |
| PORT3 / ETH 0.009% | uniswap-v4-ethereum | 0x58ff...dc56 | 0.000000000001695397452 |
| PORT3 / ETH 89.991% | uniswap-v4-ethereum | 0x4968...3373 | 0.00000000004600405214 |
| PORT3 / ETH 99.1% | uniswap-v4-ethereum | 0x9d14...448f | 0.000000000858284409 |
| PORT3 / ETH 99.09% | uniswap-v4-ethereum | 0xbce4...91d4 | 0.000000000000008244811112 |
| PORT3 / USDT 99.99% | uniswap-v4-ethereum | 0x6000...f622 | 0.000000000001649116532 |
| PORT3 / USDT 50% | uniswap-v4-ethereum | 0x5b2f...f557 | 0.0005124379611 |
| PORT3 / ETH 89.993% | uniswap-v4-ethereum | 0x6e4a...6ae9 | 0.000000000000001095664018 |
| PORT3 / ETH 99% | uniswap-v4-ethereum | 0xc43e...46b4 | 0.00001571452719 |
| PORT3 / ETH 99.011% | uniswap-v4-ethereum | 0x8566...8f56 | 0.01816405419 |
| PORT3 / ETH 40% | uniswap-v4-ethereum | 0xab43...e859 | 0.03028898197 |
| PORT3 / ETH 99.51% | uniswap-v4-ethereum | 0xfe6d...b23e | 0.0227969832 |
| USDC / PORT3 20% | uniswap-v4-ethereum | 0xaf3d...c78a | 0.022569099 |
| USDC / PORT3 99.991% | uniswap-v4-ethereum | 0x6835...fc89 | 0.02518331332 |
| PORT3 / ETH 91% | uniswap-v4-ethereum | 0xc281...c533 | 0.00007528906325 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.