| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CNV / DAI | concave | 0x84d5...a575 | 0.172458816577421 |
| CNV / USDC 1% | uniswap-v4-ethereum | 0x95d6...e89b | 0.4155126988 |
| CNV / ETH 3.3% | uniswap-v4-ethereum | 0xd74d...9aa9 | 0.5530319139 |
| CNV / WETH 1% | uniswap_v3 | 0x0311...905a | 0.7548015148 |
| CNV / USDC 1% | uniswap_v3 | 0x9d60...2b1d | 0.4167895203 |
| CNV / USDC 0.3% | uniswap_v3 | 0x0826...95e8 | 5.97348335698896 |
| CNV / DAI 1% | uniswap_v3 | 0xa427...9622 | 10.2794698393 |
| CNV / WETH | concave | 0x0635...aee7 | 5.571177041594648453466088162505287278038470064126358592432832193006270699839879152903865268 |
| CNV / GP | concave | 0xf44e...b859 | 0.004197816378 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.