| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OHM / sUSDS 0.3% | uniswap_v3 | 0x0858...a755 | 13.7274584394129 |
| OHM / WETH 0.3% | uniswap_v3 | 0x8805...8598 | 17.2018022653858 |
| OHM / USDC 0.3% | uniswap_v3 | 0x893f...e97d | 17.3168441511602 |
| OHM / EEFI | uniswap_v2 | 0x79fe...1da8 | 13.7718353012597 |
| OHM / crvFRAX | curve | 0xfc1e...e48d | 13.9197009367897 |
| gOHM / OHM 0.05% | uniswap_v3 | 0xa3cb...a306 | 13.7119752643354 |
| OHM / DAI | sushiswap | 0x0554...22d3 | 17.2900215405633 |
| OHM / WETH | curve | 0x6ec3...728b | 17.191926628413285954128393945643132976419482705692276872008442552 |
| OHM / wstETH 0.3% | balancer_ethereum | 0xd4f7...cf0f | 17.1612259075119 |
| OHM / ODIN | uniswap_v2 | 0x08b3...b08d | 14.1734313756147 |
| OHM / DAI / WETH 0.3% | balancer_ethereum | 0xc45d...70f9 | 17.4123904823416 |
| OHM / WETH | sushiswap | 0x69b8...e4da | 17.078822672967 |
| OHM / FRAX | sushiswap | 0x04fc...e7ff | 17.2891821192023 |
| OHM / FDT 1% | balancer_ethereum | 0xfb46...a79a | 14.5231049373313 |
| OHM / FRAX | uniswap_v2 | 0xb612...cc39 | 18.5724866948917 |
| OHM / WETH 0.3% | balancer_ethereum | 0xd1ec...3558 | 17.7256629874722 |
| BOND / OHM 1% | balancer_ethereum | 0xf5f6...64df | 14.4163751293478 |
| OHM / BTBB | uniswap_v2 | 0xf245...222c | 14.5756330076411 |
| OHM / WETH 0.3% | kyberswap_elastic | 0x23b0...65be | 10.1986917428214 |
| OHM / FRAX | fraxswap_ethereum | 0x5769...dcfa | 17.3392560974139 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.