| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ELF / WETH | uniswap_v2 | 0xa6be...9de8 | 0.0928215044016693 |
| SASHIMI / ELF | uniswap_v2 | 0x1629...1f98 | 0.100132230156751 |
| ELF / USDT 88% | uniswap-v4-ethereum | 0xb871...a0c5 | 0.1384630657 |
| ELF / SASHIMI | sashimiswap | 0xf7ba...edaf | 0.04042235464 |
| ELF / USDT 0.3% | uniswap-v4-ethereum | 0x6ef7...5fcc | 0.08545258379 |
| ELF / USDT 0.5% | uniswap-v4-ethereum | 0xd669...648f | 0.08450523598 |
| ELF / USDT 70% | uniswap-v4-ethereum | 0x6a45...04b4 | 0.1438310591 |
| ELF / USDT 0.6% | uniswap-v4-ethereum | 0x502f...fe0a | 0.08252045692 |
| ELF / USDT 1% | uniswap-v4-ethereum | 0x4af2...2bdc | 0.08359986912 |
| ELF / USDT 77% | uniswap-v4-ethereum | 0x4090...28ef | 0.0894006853 |
| ELF / KABOSU | uniswap_v2 | 0xd8aa...9250 | 0.2187580972 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.