| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CRO / ETH 1% | uniswap-v4-ethereum | 0x3a4f...66c6 | 0.0947029713024604 |
| CRO / WETH | defi_swap | 0x9ef7...9350 | 0.0943974909234709 |
| CRO / WETH 1% | uniswap_v3 | 0x87b1...cf12 | 0.0945398114089936 |
| CRO / USDC | defi_swap | 0x35e8...1274 | 0.0937788884670895 |
| CRO / WETH | uniswap_v2 | 0x9070...94ad | 0.0944739953993684 |
| CRO / USDT | defi_swap | 0x4087...fdf4 | 0.0939054703207077 |
| CRO / LINK | defi_swap | 0x66c4...65a5 | 0.0932556783034447 |
| CRO / ZIK 1% | uniswap-v4-ethereum | 0x037f...190f | 0.0943868941002727 |
| CRO / DAI | defi_swap | 0x97d9...5f55 | 0.0933383986884214 |
| CRO / UNI | defi_swap | 0x016f...b290 | 0.0933240763570724 |
| CRO / WBTC | defi_swap | 0x1914...dc25 | 0.0935133594677564 |
| CRO / ENJ | defi_swap | 0x1057...bad6 | 0.0930075524670537 |
| CRO / W 0.3% | uniswap-v4-ethereum | 0x29d2...541d | 0.0942562907949739 |
| CRO / WETH | saitaswap-ethereum | 0x0a60...1dd7 | 0.0946385234866157 |
| CRO / COMP | defi_swap | 0x2e5b...3a64 | 0.0980337258255169 |
| TOM3 / CRO 0.3% | uniswap_v3 | 0xd978...5dd9 | 0.0949093160812365 |
| CRO / WETH | sushiswap | 0x0be8...4a35 | 0.0946237777661667 |
| TRU / CRO | defi_swap | 0x1552...c105 | 0.0945780197325016 |
| CRO / MKR | defi_swap | 0x394c...f22c | 0.0972096220038005 |
| CRO / WETH | saitaswap-ethereum | 0x919a...7947 | 0.0966160544867331 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.