| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ELEVATE / ETH 0.3% | uniswap-v4-ethereum | 0xdd3d...59ee | 0.0953613955818907 |
| ELEVATE / IZE 0.3% | uniswap-v4-ethereum | 0x5106...f0d0 | 0.0953356056569936 |
| GROW / ELEVATE 0.3% | uniswap-v4-ethereum | 0xecd3...9ecd | 0.0953356056569936 |
| ELEVATE / ETH 9.6% | uniswap-v4-ethereum | 0xf40a...c4e2 | 0.0091502663116685 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0x9429...8f28 | 0.01906805435 |
| RALLY / ELEVATE 0.3% | uniswap-v4-ethereum | 0xbd78...4fec | 0.0943924418810307 |
| GROW / ELEVATE 0.3% | uniswap-v4-ethereum | 0x6f98...c893 | 0.01762644368 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xb590...5e3a | 0.0182573584 |
| ELMT / ELEVATE 0.3% | uniswap-v4-ethereum | 0xc526...74c3 | 0.0959416960982017 |
| ELEVATE / WIN 0.3% | uniswap-v4-ethereum | 0x8459...fe4f | 0.0953586572660448 |
| ELEVATE / GREEN 0.3% | uniswap-v4-ethereum | 0xcc16...99c0 | 0.0953673381122599 |
| ELEVATE / SWITCH 0.3% | uniswap-v4-ethereum | 0xd086...fd8e | 0.0953803641892222 |
| ELEVATE / USDT 0.3% | uniswap-v4-ethereum | 0x2dc8...3b40 | 0.01660215414 |
| ELEVATE / USDC 10% | uniswap-v4-ethereum | 0x1508...e35c | 0.005087996431 |
| INDXL / ELEVATE 10% | uniswap-v4-ethereum | 0x5ed6...cb4f | 0.0953265507435079 |
| ELEVATE / ETH 9.7% | uniswap-v4-ethereum | 0xe918...14d6 | 0.004105745478 |
| INDXL / ELEVATE 1% | uniswap-v4-ethereum | 0xd03a...71e6 | 0.0947719886653332 |
| ELEVATE / ETH 1% | uniswap-v4-ethereum | 0x1bbc...054f | 0.09406782162 |
| ELEVATE / USDC 7.6% | uniswap-v4-ethereum | 0x209f...52e6 | 0.005275561607 |
| ELEVATE / USDT 0.3% | uniswap-v4-ethereum | 0xdd96...1691 | 0.01615260897 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.