| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CRO / ETH 1% | uniswap-v4-ethereum | 0x3a4f...66c6 | 0.0773274217260775 |
| CRO / WETH | defi_swap | 0x9ef7...9350 | 0.0765881447304362 |
| CRO / WETH 1% | uniswap_v3 | 0x87b1...cf12 | 0.0758152174167873 |
| CRO / USDC | defi_swap | 0x35e8...1274 | 0.0768484187942077 |
| CRO / WETH | uniswap_v2 | 0x9070...94ad | 0.0769300955559815 |
| CRO / USDT | defi_swap | 0x4087...fdf4 | 0.0767843194205842 |
| CRO / ZIK 1% | uniswap-v4-ethereum | 0x037f...190f | 0.0755810636366755 |
| CRO / LINK | defi_swap | 0x66c4...65a5 | 0.0763599135476687 |
| CRO / UNI | defi_swap | 0x016f...b290 | 0.0774635407361898 |
| CRO / DAI | defi_swap | 0x97d9...5f55 | 0.0766150616535862 |
| CRO / WBTC | defi_swap | 0x1914...dc25 | 0.0777082806701674 |
| HBTC / CRO | defi_swap | 0x0a79...2658 | 0.0755222891424778 |
| CRO / ENJ | defi_swap | 0x1057...bad6 | 0.0777069511726259 |
| AAVE / CRO | defi_swap | 0x91f4...3c6a | 0.0755222891424778 |
| TOM3 / CRO 0.3% | uniswap_v3 | 0xd978...5dd9 | 0.075963835831024 |
| CRO / COMP | defi_swap | 0x2e5b...3a64 | 0.07772397871821 |
| CRO / MKR | defi_swap | 0x394c...f22c | 0.0786860035441625 |
| CRO / WETH | sushiswap | 0x0be8...4a35 | 0.077316295600457 |
| REN / CRO | defi_swap | 0x1c3f...468f | 0.0784335367434786 |
| CRO / renBTC | defi_swap | 0x5d30...6466 | 0.0784335367434786 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.