| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| HLX / ELMNT | uniswap_v2 | 0xcc4d...f30e | 0.0000000212884685978369 |
| BDX / ELMNT | uniswap_v2 | 0xc452...1cd1 | 0.000000020689412064455 |
| INF / ELMNT | uniswap_v2 | 0x4c50...3b49 | 0.0000000205642938607201 |
| HYDRA / ELMNT | uniswap_v2 | 0xb96a...a555 | 0.0000000207131425251408 |
| HYPER / ELMNT | uniswap_v2 | 0x6ec6...cff5 | 0.0000000205231745278081 |
| AWX / ELMNT | uniswap_v2 | 0x6711...a313 | 0.0000000207131425251408 |
| ORX / ELMNT | uniswap_v2 | 0x79a0...930f | 0.000000020684988790468 |
| FLUX / ELMNT | uniswap_v2 | 0xddc6...ecab | 0.0000000212846460886098 |
| E280 / ELMNT | uniswap_v2 | 0xd560...f195 | 0.000000021295033897752 |
| STAX / ELMNT | uniswap_v2 | 0x190b...595b | 0.00000002078441609 |
| X28 / ELMNT | uniswap_v2 | 0x57a9...0e6c | 0.00000002363562427 |
| ELMNT / SHOGUN | uniswap_v2 | 0xf77e...4330 | 0.00000002240914743 |
| DRAGONX / ELMNT | uniswap_v2 | 0x2139...c3db | 0.0000000218000696387164 |
| VOLT / ELMNT | uniswap_v2 | 0xe942...5b60 | 0.00000002107265488 |
| ELMNT / SCALE | uniswap_v2 | 0x0910...e271 | 0.0000000217861842551403 |
| BFX / ELMNT | uniswap_v2 | 0x6da1...7bd3 | 0.00000002235347436 |
| LGNDX / ELMNT | uniswap_v2 | 0x0d46...4e01 | 0.00000002063896272 |
| JAKEX / ELMNT | uniswap_v2 | 0xf821...9211 | 0.00000002263783364 |
| MORPH / ELMNT | uniswap_v2 | 0xd29f...1bf2 | 0.0000000217830618809278 |
| ALIENX / ELMNT | uniswap_v2 | 0xa35a...5b9d | 0.00000002061997992 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.