| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CRO / ETH 1% | uniswap-v4-ethereum | 0x3a4f...66c6 | 0.105839765319616 |
| CRO / WETH 1% | uniswap_v3 | 0x87b1...cf12 | 0.105865142904423 |
| CRO / WETH | defi_swap | 0x9ef7...9350 | 0.104819708642901 |
| CRO / USDC | defi_swap | 0x35e8...1274 | 0.105130799556105 |
| CRO / WETH | uniswap_v2 | 0x9070...94ad | 0.105241514610068 |
| CRO / USDT | defi_swap | 0x4087...fdf4 | 0.105365556581507 |
| CRO / LINK | defi_swap | 0x66c4...65a5 | 0.105193277341568 |
| CRO / ZIK 1% | uniswap-v4-ethereum | 0x037f...190f | 0.10511106366874 |
| CRO / DAI | defi_swap | 0x97d9...5f55 | 0.106436529575953 |
| CRO / ENJ | defi_swap | 0x1057...bad6 | 0.105034750874768 |
| CRO / WBTC | defi_swap | 0x1914...dc25 | 0.106376396359766 |
| CRO / W 0.3% | uniswap-v4-ethereum | 0x29d2...541d | 0.104392659400142 |
| CRO / COMP | defi_swap | 0x2e5b...3a64 | 0.103955847926856 |
| TRU / CRO | defi_swap | 0x1552...c105 | 0.105966866926866 |
| CRO / WETH | sushiswap | 0x0be8...4a35 | 0.106672725780094 |
| CRO / WETH | saitaswap-ethereum | 0x0a60...1dd7 | 0.107461434981917 |
| TOM3 / CRO 0.3% | uniswap_v3 | 0xd978...5dd9 | 0.1047247757506 |
| CRO / ETHMNY | uniswap_v2 | 0x7519...6be3 | 0.108291053735864 |
| CRO / MKR | defi_swap | 0x394c...f22c | 0.107402653407116 |
| CRO / WETH | saitaswap-ethereum | 0x919a...7947 | 0.107309370238193 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.