Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CRO / WETH 1% | uniswap_v3 | 0x87b1...cf12 | 0.0808530801495724 |
CRO / WETH | defi_swap | 0x9ef7...9350 | 0.080238804438299 |
CRO / USDC | defi_swap | 0x35e8...1274 | 0.0797873568693837 |
CRO / WETH | uniswap_v2 | 0x9070...94ad | 0.0812174049314089 |
CRO / USDT | defi_swap | 0x4087...fdf4 | 0.079756002515297 |
CRO / LINK | defi_swap | 0x66c4...65a5 | 0.0807884221919601 |
CRO / UNI | defi_swap | 0x016f...b290 | 0.0818936217424347 |
CRO / ENJ | defi_swap | 0x1057...bad6 | 0.0799361368026464 |
CRO / WBTC | defi_swap | 0x1914...dc25 | 0.0818009844843033 |
AAVE / CRO | defi_swap | 0x91f4...3c6a | 0.0786515243962539 |
CRO / DAI | defi_swap | 0x97d9...5f55 | 0.0806763418446699 |
TOM3 / CRO 0.3% | uniswap_v3 | 0xd978...5dd9 | 0.0824241861255867 |
CRO / CRV | defi_swap | 0xd3bf...9fad | 0.0776745685715873 |
CRO / WETH | sushiswap | 0x0be8...4a35 | 0.0817965850855665 |
CRO / MKR | defi_swap | 0x394c...f22c | 0.0808100478953382 |
REN / CRO | defi_swap | 0x1c3f...468f | 0.0777765563601893 |
CRO / COMP | defi_swap | 0x2e5b...3a64 | 0.0774374853625763 |
CRO / WETH | saitaswap-ethereum | 0x0a60...1dd7 | 0.0766825281552067 |
TRU / CRO | defi_swap | 0x1552...c105 | 0.0900050150735445 |
CRO / renBTC | defi_swap | 0x5d30...6466 | 0.0893825018135229 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.