Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RALLY / ELMT 0.3% | uniswap-v4-ethereum | 0x0f7e...35f0 | 0.000563031911224078 |
GROW / ELMT 0.3% | uniswap-v4-ethereum | 0x1aaa...da6f | 0.000563031911224078 |
ELMT / SWITCH 0.3% | uniswap-v4-ethereum | 0x3ba3...2f9a | 0.000863674357992497 |
ELMT / WETH 0.3% | uniswap_v3 | 0x5337...8f96 | 0.000559405571376942 |
ELMT / WIN 0.3% | uniswap_v3 | 0x0935...8caa | 0.00086650737692889 |
ELMT / SWITCH 0.3% | uniswap_v3 | 0x14fa...dde3 | 0.000874052981044158 |
ELMT / USDT 0.3% | uniswap-v4-ethereum | 0x052e...dc36 | 0.0003133984799 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.