This graph displays the name and number of the frequently used contracts.
This graph helps in determining the most commonly used contracts that are used for authentication.