Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ELMNT / TITANX | uniswap_v2 | 0x8668...d956 | 0.0000000810301108054916 |
E280 / ELMNT | uniswap_v2 | 0xd560...f195 | 0.0000000810274232990526 |
BDX / ELMNT | uniswap_v2 | 0xc452...1cd1 | 0.0000000840522753504586 |
HLX / ELMNT | uniswap_v2 | 0xcc4d...f30e | 0.0000000783291231713456 |
DRAGONX / ELMNT | uniswap_v2 | 0x2139...c3db | 0.0000000840522753504586 |
STAX / ELMNT | uniswap_v2 | 0x190b...595b | 0.0000000890411197291471 |
X28 / ELMNT | uniswap_v2 | 0x57a9...0e6c | 0.0000000828966979949598 |
INF / ELMNT | uniswap_v2 | 0x4c50...3b49 | 0.0000000823831799911023 |
ELMNT / SHOGUN | uniswap_v2 | 0xf77e...4330 | 0.0000000878198186589339 |
ELMNT / SCALE | uniswap_v2 | 0x0910...e271 | 0.0000000828966979949598 |
AWX / ELMNT | uniswap_v2 | 0x6711...a313 | 0.0000000828966979949598 |
VOLT / ELMNT | uniswap_v2 | 0xe942...5b60 | 0.0000000868409940501657 |
HYPER / ELMNT | uniswap_v2 | 0x6ec6...cff5 | 0.0000000828966979949598 |
ELMNT / BLAZE | uniswap_v2 | 0xe876...d08b | 0.0000000845895116590205 |
MORPH / ELMNT | uniswap_v2 | 0xd29f...1bf2 | 0.0000000810881389315708 |
HYDRA / ELMNT | uniswap_v2 | 0xb96a...a555 | 0.0000000810274232990526 |
ORX / ELMNT | uniswap_v2 | 0x79a0...930f | 0.0000000869640872868003 |
LGNDX / ELMNT | uniswap_v2 | 0x0d46...4e01 | 0.0000000784080441957707 |
ALIENX / ELMNT | uniswap_v2 | 0xa35a...5b9d | 0.0000000878826845557111 |
ELMNT / MATRIX | uniswap_v2 | 0x0aaa...19ff | 0.0000000815824829728039 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.