| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HLX / ELMNT | uniswap_v2 | 0xcc4d...f30e | 0.0000000122086397677269 |
| STAX / ELMNT | uniswap_v2 | 0x190b...595b | 0.000000012076267269341 |
| E280 / ELMNT | uniswap_v2 | 0xd560...f195 | 0.0000000115448008012356 |
| HYDRA / ELMNT | uniswap_v2 | 0xb96a...a555 | 0.0000000120761077022612 |
| ORX / ELMNT | uniswap_v2 | 0x79a0...930f | 0.0000000120761077022612 |
| X28 / ELMNT | uniswap_v2 | 0x57a9...0e6c | 0.0000000119175195103907 |
| ELMNT / SHOGUN | uniswap_v2 | 0xf77e...4330 | 0.00000001148032701 |
| DRAGONX / ELMNT | uniswap_v2 | 0x2139...c3db | 0.0000000115596691255761 |
| BDX / ELMNT | uniswap_v2 | 0xc452...1cd1 | 0.000000011546929211476 |
| INF / ELMNT | uniswap_v2 | 0x4c50...3b49 | 0.000000011546929211476 |
| VOLT / ELMNT | uniswap_v2 | 0xe942...5b60 | 0.0000000116236119232206 |
| ELMNT / SCALE | uniswap_v2 | 0x0910...e271 | 0.00000001179305221 |
| LGNDX / ELMNT | uniswap_v2 | 0x0d46...4e01 | 0.00000001191479584 |
| HYPER / ELMNT | uniswap_v2 | 0x6ec6...cff5 | 0.0000000127495618 |
| JAKEX / ELMNT | uniswap_v2 | 0xf821...9211 | 0.00000001142453204 |
| BFX / ELMNT | uniswap_v2 | 0x6da1...7bd3 | 0.0000000115596691255761 |
| AWX / ELMNT | uniswap_v2 | 0x6711...a313 | 0.00000001333116105 |
| MORPH / ELMNT | uniswap_v2 | 0xd29f...1bf2 | 0.0000000115222191162185 |
| ALIENX / ELMNT | uniswap_v2 | 0xa35a...5b9d | 0.00000001096811592 |
| FLUX / ELMNT | uniswap_v2 | 0xddc6...ecab | 0.00000001413336526 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.