| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ARTH / USDC | curve | 0xb401...f61f | 0.1440541411 |
| ARTH / WETH 1% | uniswap_v3 | 0xe7cd...869b | 0.8843803317 |
| ARTH / USDC 0.05% | uniswap_v3 | 0x031a...80ab | 1.0098278741 |
| ARTH / WETH | curve | 0x19a0...2410 | 0.1380796255 |
| OHM / ARTH | curve | 0x27a8...6175 | 0.1363502341 |
| ARTH / 3Crv | curve | 0x96f3...f423 | 0.1392803496 |
| MAHA / ARTH 1% | uniswap_v3 | 0x8a03...77bc | 0.1603750499 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.