Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PORK / ETH 1% | uniswap-v4-ethereum | 0xd009...c8bc | 0.0000000287266447828164 |
PORK / WETH 1% | uniswap_v3 | 0x3313...827c | 0.000000029054839914141 |
PNDC / PORK 1% | uniswap_v3 | 0xc026...f365 | 0.0000000287349443549666 |
PNDC / PORK 1% | uniswap-v4-ethereum | 0xe8ea...ad38 | 0.0000000284969397292506 |
PORK / WETH | uniswap_v2 | 0xc47c...778a | 0.0000000277087378381131 |
PORK / WETH | x7-finance | 0xe827...a1db | 0.0000000256390987582097 |
BNB / PORK | x7-finance | 0x92ee...7298 | 0.00000002515823721 |
PORK / WETH 1% | solidly-v3 | 0x0e1e...7238 | 0.00000002365955687 |
PORK / WETH 1% | blueprint | 0x966a...7b4f | 0.000000300384529375246 |
NFAi / PORK | uniswap_v2 | 0xd223...0e36 | 0.00000001971112039 |
PORK / USDT 1% | uniswap_v3 | 0xe154...0175 | 0.00000002237430711 |
PORK / WETH 0.3% | uniswap_v3 | 0xb9ed...473c | 0.000000165992247912388 |
🥞🥞🥞 / PORK | uniswap_v2 | 0x3313...a423 | 0.0000000493201137 |
PORK / MAGA 1% | uniswap_v3 | 0x8fa2...dfb8 | 0.000000110021888234402 |
RETARD / PORK 1% | uniswap_v3 | 0xc58e...b99a | 0.000000164861765183269 |
USDC / PORK | uniswap_v2 | 0x3580...2358 | 0.00000000009611103406 |
PORK / USDC 1% | uniswap_v3 | 0x3c0c...a64d | 0.000000525223446321461 |
Mog / PORK 1% | uniswap_v3 | 0x1a33...c06e | 0.00000004133175101 |
PEPE / PORK 1% | uniswap_v3 | 0x0e97...8c52 | 0.000000251952560545783 |
pPORK / PORK 1% | uniswap_v3 | 0x82e5...216b | 0.000000788564451015061 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.