| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ELEVATE / USDT 0.3% | uniswap-v4-ethereum | 0x9103...e95d | 0.09557334076 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0xd695...6a20 | 0.00169638543820341 |
| GROW / ELEVATE 0.3% | uniswap-v4-ethereum | 0x7bd0...f336 | 0.00169472332482038 |
| ELEVATE / WIN 0.3% | uniswap-v4-ethereum | 0x4c3c...bae0 | 0.001696068404 |
| ELMT / ELEVATE 0.3% | uniswap-v4-ethereum | 0xe2fb...6a1b | 0.00169364196279481 |
| ELEVATE / GREEN 0.3% | uniswap-v4-ethereum | 0xeaca...c4b2 | 0.001695159123 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0x18c8...1162 | 0.001695856908 |
| ELEVATE / IZE 0.3% | uniswap-v4-ethereum | 0xff21...96da | 0.001693641963 |
| ELEVATE / ETH 9.6% | uniswap-v4-ethereum | 0xf40a...c4e2 | 0.000705933222 |
| ELEVATE / GREEN 0.35% | uniswap-v4-ethereum | 0x7020...a145 | 0.00169359098 |
| ELEVATE / IZE 0.35% | uniswap-v4-ethereum | 0x2ed4...5772 | 0.001694445028 |
| ELEVATE / SWITCH 0.35% | uniswap-v4-ethereum | 0xfc92...612f | 0.001696068404 |
| ELEVATE / WIN 0.3% | uniswap-v4-ethereum | 0xb050...f770 | 0.001695890956 |
| ELMT / ELEVATE 0.35% | uniswap-v4-ethereum | 0x73c3...5a04 | 0.00169589095582466 |
| GROW / ELEVATE 0.35% | uniswap-v4-ethereum | 0x8b5b...2546 | 0.00168139833367177 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0x9429...8f28 | 0.01906805435 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0xbd78...4fec | 0.0964561397 |
| GROW / ELEVATE 0.3% | uniswap-v4-ethereum | 0x6f98...c893 | 0.01762644368 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xb590...5e3a | 0.0182573584 |
| ELEVATE / ETH 80% | uniswap-v4-ethereum | 0x9395...1f47 | 0.001664722562 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.