Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
OUSD / 3Crv | curve | 0x8765...910d | 1.00228032675977 |
OUSD / USDC | curve | 0x6d18...26dc | 0.997820003921917 |
OGN / OUSD / OETH | curve | 0xb8ac...3fa2 | 1.00039789990237 |
OUSD / USDT 0.05% | uniswap_v3 | 0x1293...3374 | 0.999830517124442 |
OUSD / USDT | curve | 0xdcc3...b897 | 0.997586078724079 |
ICHI / OUSD 1% | uniswap_v3 | 0x7a2c...2490 | 0.9925335374 |
OUSD / USDT | curve | 0x3771...fe41 | 1.0018955016 |
OUSD / USDC | uniswap_v2 | 0x4d93...24aa | 1.1708194574 |
OUSD / USDT | uniswap_v2 | 0xcc01...5f71 | 1.0441340728 |
OUSD / USDT | sushiswap | 0xe445...5283 | 0.8467989533 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.