| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ARTH / USDC | curve | 0xb401...f61f | 0.026832883924603 |
| OHM / ARTH | curve | 0x27a8...6175 | 0.021083609606295 |
| ARTH / MAHA 1% | uniswap_v3 | 0xc5ee...305d | 2.01529420497421172032860509207399072594303127 |
| MAHA / ARTH 1% | uniswap_v3 | 0x8a03...77bc | 0.666798856 |
| ARTH / WETH 1% | uniswap_v3 | 0xe7cd...869b | 0.3963917188 |
| ARTH / USDC 0.05% | uniswap_v3 | 0x031a...80ab | 1.0029718024 |
| ARTH / WETH | curve | 0x19a0...2410 | 0.0257199524630607 |
| ARTH / 3Crv | curve | 0x96f3...f423 | 0.0280001128315741 |
| ARTH / WETH 0.3% | uniswap_v3 | 0xfd6c...716b | 212.29204458044667244306732230883 |
| ARTH / DAI | curve | 0xfd48...42aa | 2.330775682146603274507627263552316075526259 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.