| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PORK / WETH 1% | uniswap_v3 | 0x3313...827c | 0.0000000195593293530137 |
| PORK / ETH 1% | uniswap-v4-ethereum | 0xd009...c8bc | 0.0000000196242435895853 |
| PNDC / PORK 1% | uniswap-v4-ethereum | 0xe8ea...ad38 | 0.0000000194592182496386 |
| PNDC / PORK 1% | uniswap_v3 | 0xc026...f365 | 0.0000000192696588796838 |
| PORK / WETH | uniswap_v2 | 0xc47c...778a | 0.0000000196474236187269 |
| PORK / ETH 4% | uniswap-v4-ethereum | 0xb3e9...4792 | 0.0000000195362572965552 |
| PORK / WETH | x7-finance | 0xe827...a1db | 0.0000000187006971277768 |
| PNDC / PORK 4% | uniswap-v4-ethereum | 0x7a16...93cd | 0.00000003494074998 |
| BNB / PORK | x7-finance | 0x92ee...7298 | 0.0000000182884264185887 |
| PORK / WETH 1% | solidly-v3 | 0x0e1e...7238 | 0.000000019968055062702 |
| NFAi / PORK | uniswap_v2 | 0xd223...0e36 | 0.00000001765213413 |
| PORK / USDT 1% | uniswap_v3 | 0xe154...0175 | 0.00000002057866639 |
| PEPE / PORK 0.01% | uniswap-v4-ethereum | 0xeae9...0da3 | 0.00000001767608538 |
| 🥞🥞🥞 / PORK | uniswap_v2 | 0x3313...a423 | 0.0000000493201137 |
| USDC / PORK | uniswap_v2 | 0x3580...2358 | 0.00000001021813287 |
| Mog / PORK 1% | uniswap_v3 | 0x1a33...c06e | 0.00000004133175101 |
| BITCOIN / PORK 1% | uniswap_v3 | 0xecc6...5c9a | 0.00000002819691998 |
| PNDC / PORK | uniswap_v2 | 0xf25e...14f8 | 0.00000002755515466 |
| PNDC / PORK 1% | sushiswap-v3-ethereum | 0x8124...5108 | 0.00000006732403686 |
| USDC / PORK 1% | uniswap-v4-ethereum | 0xfae2...b8b7 | 0.0000000495591187 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.