| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ELMT / ELEVATE 0.3% | uniswap-v4-ethereum | 0xe2fb...6a1b | 0.0003135155632 |
| ELMT / WETH 0.3% | uniswap_v3 | 0x5337...8f96 | 0.0003132796329 |
| ELMT / WETH 1% | uniswap_v3 | 0xb836...b398 | 0.0002894096583 |
| ELMT / ELEVATE 0.35% | uniswap-v4-ethereum | 0x73c3...5a04 | 0.0003136266125 |
| ELMT / ELEVATE 0.3% | uniswap-v4-ethereum | 0xc526...74c3 | 0.0002964524624 |
| ELMT / USDC 2% | uniswap-v4-ethereum | 0x8d49...5b61 | 0.0004366343484 |
| RALLY / ELMT 0.3% | uniswap-v4-ethereum | 0x0f7e...35f0 | 0.000512285163 |
| RALLY / ELMT 0.3% | uniswap-v4-ethereum | 0x0e44...73cc | 0.000603905381 |
| GROW / ELMT 0.3% | uniswap-v4-ethereum | 0x1aaa...da6f | 0.000515862983 |
| ELMT / SWITCH 0.3% | uniswap-v4-ethereum | 0x3ba3...2f9a | 0.000531578587 |
| ELMT / IZE 0.3% | uniswap-v4-ethereum | 0xbfb5...eebc | 0.0006157354938 |
| INDXL / ELMT 10% | uniswap-v4-ethereum | 0xee90...9910 | 0.000373042553 |
| INDXL / ELMT 1% | uniswap-v4-ethereum | 0x5f73...a9c6 | 0.0003528783895 |
| ELMT / USDT 0.3% | uniswap-v4-ethereum | 0x052e...dc36 | 0.0003133984799 |
| ELMT / ELEVATE 0.3% | uniswap-v4-ethereum | 0xb945...1134 | 0.000411812137 |
| ELMT / ETH 0.3% | uniswap-v4-ethereum | 0x6a1b...3e37 | 0.0006037198611 |
| ELMT / ELEVATE 0.3% | uniswap-v4-ethereum | 0x8ec5...ecd3 | 0.0003881410736 |
| ELMT / WIN 0.3% | uniswap_v3 | 0x0935...8caa | 0.0005972926676 |
| ELMT / SWITCH 0.3% | uniswap_v3 | 0x14fa...dde3 | 0.0005801814651 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.