| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OUSD / USDC | curve | 0x6d18...26dc | 0.992913812496734 |
| OGN / OUSD / OETH | curve | 0xb8ac...3fa2 | 0.991721194146775 |
| OUSD / 3Crv | curve | 0x8765...910d | 0.993414082498114 |
| OUSD / USDT | curve | 0xdcc3...b897 | 0.993151132274672 |
| OUSD / USDT 0.05% | uniswap_v3 | 0x1293...3374 | 1.00121298541702 |
| frxUSD / OUSD | curve | 0x68d0...1f49 | 0.998073591225202 |
| ICHI / OUSD 1% | uniswap_v3 | 0x7a2c...2490 | 0.996312369070315 |
| OUSD / USDT | curve | 0x3771...fe41 | 1.0025268551 |
| OUSD / USDT | uniswap_v2 | 0xcc01...5f71 | 1.0441340728 |
| OUSD / USDC | uniswap_v2 | 0x4d93...24aa | 1.073404955 |
| OUSD / USDT | sushiswap | 0xe445...5283 | 0.8467989533 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.