Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CVX / WETH | curve | 0xb576...e0d4 | 3.572960974033365456450930761503559446137938712165233801228382996 |
frxETH / CVX | curve | 0x47d5...5093 | 3.5389143075694079038377758377314408429025318789721395202660607825 |
CVX / CRV 1% | uniswap_v3 | 0x645c...b887 | 3.54553797795379 |
CVX / WETH | sushiswap | 0x0576...e906 | 3.57444976874711 |
CVX / WETH 1% | uniswap_v3 | 0x2e47...c35a | 3.55874561872242 |
CVX / CRV 1% | uniswap-v4-ethereum | 0x5531...1eb3 | 3.54163853718693 |
CVX / USDC 0.9% | uniswap-v4-ethereum | 0x504f...47ee | 3.56061628395957 |
tCVX / CVX | curve | 0x2ca7...123d | 3.54383367278572 |
CVX / crvFRAX | curve | 0xbec5...b10d | 3.5338514748561162378977155829195583681473109682233083861108127 |
clevCVX / CVX | curve | 0xf907...a5a6 | 3.54408323184704 |
CVX / ETH 0.5% | uniswap-v4-ethereum | 0xbae9...2b28 | 3.5884167810385 |
CVX / CRV 0.3% | uniswap-v4-ethereum | 0x6ac5...2b82 | 3.54163853718693 |
CVX / WETH | uniswap_v2 | 0xdf4a...499d | 2.04311024716727 |
CVX / DMusd 0.05% | sushiswap-v3-ethereum | 0xfc64...5d2e | 3.5785944994 |
afCVX / CVX | curve | 0x7956...af08 | 4.2129604703 |
lpxCvx / CVX | curve | 0x7272...4c1c | 3.45329720165423 |
CVX / bentCVX | curve | 0xffa6...2f80 | 3.49387011341207 |
CVX / USDC 1% | uniswap-v4-ethereum | 0xdf34...17c5 | 3.5545456824988 |
bentCVX / CVX | curve | 0xf083...9732 | 3.49387011341207 |
CVX / WETH 1% | kyberswap_elastic | 0x81df...33ce | 6.62711565082821 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.