Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PORK / WETH 1% | uniswap_v3 | 0x3313...827c | 0.0000000472218797899897 |
PNDC / PORK 1% | uniswap_v3 | 0xc026...f365 | 0.0000000478751372277904 |
PORK / ETH 1% | uniswap-v4-ethereum | 0xd009...c8bc | 0.000000047197891481344 |
PORK / WETH | uniswap_v2 | 0xc47c...778a | 0.000000056063357437602 |
PORK / WETH 1% | solidly-v3 | 0x0e1e...7238 | 0.0000000446670189604136 |
BITCOIN / PORK 1% | uniswap_v3 | 0xecc6...5c9a | 0.0000000493570870946919 |
PORK / WETH | x7-finance | 0xe827...a1db | 0.0000000472034676048241 |
BNB / PORK | x7-finance | 0x92ee...7298 | 0.00000004105590669 |
PORK / WETH 1% | blueprint | 0x966a...7b4f | 0.000000300384529375246 |
PORK / USDT 1% | uniswap_v3 | 0xe154...0175 | 0.00000004197705442 |
NFAi / PORK | uniswap_v2 | 0xd223...0e36 | 0.00000004956571405 |
PORK / WETH 0.3% | uniswap_v3 | 0xb9ed...473c | 0.000000165992247912388 |
🥞🥞🥞 / PORK | uniswap_v2 | 0x3313...a423 | 0.0000000493201136977811 |
PORK / MAGA 1% | uniswap_v3 | 0x8fa2...dfb8 | 0.000000110021888234402 |
RETARD / PORK 1% | uniswap_v3 | 0xc58e...b99a | 0.000000164861765183269 |
PORK / USDC 1% | uniswap_v3 | 0x3c0c...a64d | 0.000000525223446321461 |
USDC / PORK | uniswap_v2 | 0x3580...2358 | 0.000000044674675 |
Mog / PORK 1% | uniswap_v3 | 0x1a33...c06e | 0.0000000413317510128299 |
PEPE / PORK 1% | uniswap_v3 | 0x0e97...8c52 | 0.000000251952560545783 |
pPORK / PORK 1% | uniswap_v3 | 0x82e5...216b | 0.000000788564451015061 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.