| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ₿Gold / PYUSD | uniswap_v2 | 0xbed7...284b | 0.0000237180076809115 |
| ₿Gold / PAXG | uniswap_v2 | 0x4099...e4bb | 0.0000235714535851338 |
| ₿Gold / USDT | uniswap_v2 | 0x676a...044a | 0.0000227105637639113 |
| ₿Gold / CRV | uniswap_v2 | 0x3c0e...e62d | 0.000026266682545974 |
| ₿Gold / BAL | uniswap_v2 | 0x7104...8d79 | 0.0000229296724029978 |
| ₿Gold / crvUSD | uniswap_v2 | 0x3faf...be5d | 0.0000231779321443282 |
| ₿Gold / wstETH | uniswap_v2 | 0x9d6a...a78a | 0.0000170591894895733 |
| ₿Gold / XAUt | uniswap_v2 | 0xede1...1663 | 0.810640080606866 |
| ₿Gold / WBTC | uniswap_v2 | 0x5a5f...ff99 | 0.711910812315357 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.