| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| crvUSD / WETH / CRV | curve | 0x4ebd...4a14 | 0.990239379604724 |
| CRV / cvxCRV | curve | 0x971a...8623 | 0.372189975424813 |
| CRV / sdCRV | curve | 0xca02...72d0 | 0.373956703985209 |
| CRV / WETH 0.3% | uniswap_v3 | 0x919f...af79 | 0.387093170162619 |
| CRV / yCRV | curve | 0x99f5...e1e5 | 0.373820730840527 |
| CVX / CRV 1% | uniswap_v3 | 0x645c...b887 | 0.385172530110634 |
| CRV / USDT 0.3% | uniswap_v3 | 0x07b1...f21e | 0.383592245816527 |
| CRV / USDC 1% | uniswap_v3 | 0x9445...2589 | 0.385447903432906 |
| CRV / WETH | sushiswap | 0x58dc...8009 | 0.384718622332504 |
| CRV / ETH 0.3% | uniswap-v4-ethereum | 0x540a...6557 | 0.384985000030982 |
| CRV / WETH | uniswap_v2 | 0x3da1...0fce | 0.384772823170269 |
| CRV / cvxCRV | curve | 0x9d04...79e8 | 0.381565257152699 |
| CRV / UNI 1% | uniswap-v4-ethereum | 0xf00d...9d9d | 0.386687387386771 |
| CRV / LINK 0.444% | uniswap-v4-ethereum | 0x48f7...1912 | 0.387028727127645 |
| CRV / PROS | curve | 0x1f57...865f | 0.375146516298405 |
| CRV / UNI | uniswap_v2 | 0x71aa...1f6e | 0.385623838095578 |
| CVX / CRV 0.3% | uniswap_v3 | 0x7cdd...f0c4 | 0.382659105424896 |
| CRV / WETH 1% | uniswap_v3 | 0x4c83...1f4e | 0.385203497171773 |
| rust / CRV 0.3% | uniswap-v4-ethereum | 0xb24d...7cd9 | 0.376779947452954 |
| BobrCRV / CRV / crvUSD | curve | 0x9fee...821f | 0.415930647078966 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.