| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OHM / WETH 0.3% | uniswap_v3 | 0x8805...8598 | 15.5201797225 |
| OHM / crvFRAX | curve | 0xfc1e...e48d | 14.3221540516 |
| OHM / DAI | sushiswap | 0x0554...22d3 | 15.4208968489 |
| OHM / EEFI | uniswap_v2 | 0x79fe...1da8 | 14.3291180074 |
| OHM / USDC 0.3% | uniswap_v3 | 0x893f...e97d | 15.7769467664 |
| OHM / WETH | curve | 0x6ec3...728b | 15.5833499926 |
| gOHM / OHM 0.3% | uniswap_v3 | 0x6220...6e2c | 14.6672357625453 |
| OHM / DAI / WETH 0.3% | balancer_ethereum | 0xc45d...70f9 | 15.9426059885 |
| OHM / wstETH 0.3% | balancer_ethereum | 0xd4f7...cf0f | 15.4400205237 |
| OHM / FRAX | sushiswap | 0x04fc...e7ff | 15.6840102484 |
| OHM / WETH | sushiswap | 0x69b8...e4da | 15.369161357 |
| OHM / sUSDS 0.3% | uniswap_v3 | 0x0858...a755 | 15.3075322668 |
| OHM / ODIN | uniswap_v2 | 0x08b3...b08d | 14.7920168066 |
| OHM / FDT 1% | balancer_ethereum | 0xfb46...a79a | 15.2332239555 |
| OHM / WETH 0.3% | kyberswap_elastic | 0x23b0...65be | 10.1986917428214 |
| OHM / FDT 1% | uniswap_v3 | 0xc172...03cb | 22.5632088552 |
| OHM / wstETH 3% | balancer_ethereum | 0xf30d...50a0 | 1.081076730158221602685233801364486133502309168 |
| OHM / WETH 1% | uniswap_v3 | 0x584e...5d3a | 15.8720142641 |
| LUSD / OHM 0.3% | balancer_ethereum | 0x18fd...f6a2 | 13.9280051028 |
| OHM / WETH 0.3% | balancer_ethereum | 0xd1ec...3558 | 18.9035306876 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.