| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / cbBTC | curve | 0x83f2...eb32 | 77390.8092226578 |
| cbBTC / WBTC 0.01% | uniswap_v3 | 0xe8f7...e124 | 77829.062122605 |
| cbBTC / WBTC | fluid-ethereum | 0x3c04...cda7 | 77947.980726951 |
| cbBTC / WBTC 0.01% | uniswap-v4-ethereum | 0x2f92...a723 | 78073.1952884695 |
| cbBTC / WBTC 0.005% | uniswap-v4-ethereum | 0xbf8f...adc6 | 77970.3134641314 |
| USDC / cbBTC 0.3% | uniswap-v4-ethereum | 0x7067...09bb | 78152.4735369284 |
| USDC / cbBTC 0.3% | uniswap_v3 | 0x4548...9e49 | 77947.2268227027 |
| eBTC / cbBTC | fluid-ethereum | 0x5d53...0971 | 77966.4599924077 |
| tBTC / cbBTC 0.01% | uniswap-v4-ethereum | 0x5459...df9a | 77731.2540362868 |
| BTC.b / cbBTC | curve | 0xa774...ad5a | 77122.6187826598 |
| cbBTC / WBTC 0.003% | uniswap-v4-ethereum | 0x5630...bfab | 77979.061142264 |
| tBTC / cbBTC | curve | 0xae6e...0bb3 | 77090.1167135789 |
| cbBTC / WBTC | curve | 0x839d...4802 | 77475.4626514866 |
| GHO / cbBTC / WETH | curve | 0x8a4f...d77f | 77849.5932569178 |
| tBTC / cbBTC 0.01% | uniswap_v3 | 0x1715...7428 | 77571.5657743994 |
| cbBTC / WBTC 0.01% | ekubo-v3-ethereum | 0x0000...8f89 | 78014.9302472212 |
| cbBTC / USDT 0.05% | uniswap-v4-ethereum | 0x6230...257f | 77903.3476640007 |
| PAXG / cbBTC 0.3% | uniswap_v3 | 0x6179...0be9 | 78173.8593894388 |
| cbBTC / WETH 0.3% | uniswap_v3 | 0x15aa...0c7b | 78353.7723347644 |
| cbBTC / WBTC 0.01% | supernova-cl | 0xab85...73d9 | 78092.8530021892 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.