| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| STAX / ELMNT | uniswap_v2 | 0x190b...595b | 0.000000011136820726492 |
| HLX / ELMNT | uniswap_v2 | 0xcc4d...f30e | 0.0000000105743854734027 |
| E280 / ELMNT | uniswap_v2 | 0xd560...f195 | 0.000000011135383902787 |
| DRAGONX / ELMNT | uniswap_v2 | 0x2139...c3db | 0.000000011136820726492 |
| X28 / ELMNT | uniswap_v2 | 0x57a9...0e6c | 0.000000011135383902787 |
| HYDRA / ELMNT | uniswap_v2 | 0xb96a...a555 | 0.000000011135383902787 |
| BDX / ELMNT | uniswap_v2 | 0xc452...1cd1 | 0.0000000111228943915146 |
| VOLT / ELMNT | uniswap_v2 | 0xe942...5b60 | 0.0000000108879284827647 |
| BFX / ELMNT | uniswap_v2 | 0x6da1...7bd3 | 0.0000000111766186637944 |
| LGNDX / ELMNT | uniswap_v2 | 0x0d46...4e01 | 0.000000011135383902787 |
| AWX / ELMNT | uniswap_v2 | 0x6711...a313 | 0.000000011698121138216 |
| JAKEX / ELMNT | uniswap_v2 | 0xf821...9211 | 0.0000000111766186637944 |
| ORX / ELMNT | uniswap_v2 | 0x79a0...930f | 0.0000000111364316469559 |
| HYPER / ELMNT | uniswap_v2 | 0x6ec6...cff5 | 0.0000000122276575485892 |
| ELMNT / MATRIX | uniswap_v2 | 0x0aaa...19ff | 0.0000000111363942195559 |
| ELMNT / PHX | uniswap_v2 | 0x595b...d22f | 0.0000000122276575485892 |
| ELMNT / SHOGUN | uniswap_v2 | 0xf77e...4330 | 0.00000001344543874 |
| INF / ELMNT | uniswap_v2 | 0x4c50...3b49 | 0.0000000115500947455393 |
| ELMNT / SCALE | uniswap_v2 | 0x0910...e271 | 0.0000000128846870189007 |
| MORPH / ELMNT | uniswap_v2 | 0xd29f...1bf2 | 0.0000000131519957986862 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.