Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CRV / cvxCRV | curve | 0x971a...8623 | 0.767636008319809 |
CRV / yCRV | curve | 0x99f5...e1e5 | 0.776121487577991 |
CRV / sdCRV | curve | 0xca02...72d0 | 0.767839653948776 |
CRV / USDT 0.3% | uniswap_v3 | 0x07b1...f21e | 0.778586877165876 |
CRV / WETH 0.3% | uniswap_v3 | 0x919f...af79 | 0.777839109140267 |
CRV / ETH 0.3% | uniswap-v4-ethereum | 0x540a...6557 | 0.77649586361485 |
CVX / CRV 1% | uniswap_v3 | 0x645c...b887 | 0.78423558637107 |
CRV / USDC 1% | uniswap_v3 | 0x9445...2589 | 0.778093475981946 |
CRV / WETH | uniswap_v2 | 0x3da1...0fce | 0.77995780293956 |
CRV / WETH | sushiswap | 0x58dc...8009 | 0.78015490858736 |
CVX / CRV 1% | uniswap-v4-ethereum | 0x5531...1eb3 | 0.78337307122236 |
CRV / cvxCRV | curve | 0x9d04...79e8 | 0.770621223199372 |
CVX / CRV 0.3% | uniswap-v4-ethereum | 0x6ac5...2b82 | 0.78036894395087 |
CRV / UNI | uniswap_v2 | 0x71aa...1f6e | 0.787505892508281 |
BobrCRV / CRV / crvUSD | curve | 0x9fee...821f | 0.4802299707 |
yCRV / CRV | curve | 0x453d...83a4 | 0.773508924024970461892592507229036508583518112444599452020669485 |
rust / CRV 0.3% | uniswap-v4-ethereum | 0xb24d...7cd9 | 0.768813613443997 |
CRV / cvxCRV | sushiswap | 0x33f6...4007 | 0.782101889304215 |
CRV / WETH 1% | uniswap_v3 | 0x4c83...1f4e | 0.775499875971331 |
cvxCRV / CRV 0.3% | uniswap_v3 | 0x620c...1ccc | 0.786151274057481 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.