| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PAXG / USDC 0.05% | uniswap_v3 | 0x5ae1...4082 | 4684.20926904782 |
| PAXG / WETH | uniswap_v2 | 0x9c4f...7c4c | 4670.8058637115 |
| PAXG / XAUt | fluid-ethereum | 0x218c...4b84 | 4667.3170761677 |
| PAXG / XAUt 0.05% | uniswap_v3 | 0xed7e...aa3e | 4671.25483922531 |
| PAXG / XAUt 0.05% | uniswap-v4-ethereum | 0x4bb2...2239 | 4677.02856795849 |
| PAXG / XAUt 0.01% | uniswap_v3 | 0xc756...ed42 | 4671.25948858914 |
| XAUt / PAXG | curve | 0xc48a...15ee | 4616.91781074013 |
| PAXG / WETH 0.3% | uniswap_v3 | 0x8a7e...66dd | 4671.89784876866 |
| PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 4662.25557416514 |
| PAXG / USDC 0.3% | uniswap_v3 | 0xb431...c0c4 | 4703.32504075076 |
| PAXG / USDT 0.05% | uniswap-v4-ethereum | 0xb9dc...f71b | 4665.0669305598 |
| PAXG / XAUt 0.03% | uniswap-v4-ethereum | 0x5c1a...12d4 | 4678.83321220029 |
| PAXG / ETH 0.3% | uniswap-v4-ethereum | 0x9404...1095 | 4685.57913131859 |
| PAXG / cbBTC 0.3% | uniswap_v3 | 0x6179...0be9 | 4700.79867635666 |
| PAXG / XGZ 0.01% | uniswap-v4-ethereum | 0xc867...153c | 4670.22322670251 |
| PAXG / XAUt 0.01% | uniswap-v4-ethereum | 0x083e...7591 | 4670.61972109184 |
| PAXG / XAUt 0.003% | uniswap-v4-ethereum | 0x7a63...2efd | 4668.70729887024 |
| PAXG / WBTC 1% | uniswap-v4-ethereum | 0xfd13...fc9c | 4709.48395236927 |
| PAXG / PROS 0.3% | balancer-v3-ethereum | 0x4155...4a84 | 4701.8429423535 |
| PAXG / USDC 0.05% | uniswap-v4-ethereum | 0xc581...6acd | 4688.07416141586 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.