| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PAXG / XAUt 0.01% | uniswap_v3 | 0xc756...ed42 | 4761.2105645683 |
| PAXG / USDC 0.05% | uniswap_v3 | 0x5ae1...4082 | 4772.4693765867 |
| PAXG / WETH | uniswap_v2 | 0x9c4f...7c4c | 4767.948182413 |
| PAXG / XAUt | fluid-ethereum | 0x218c...4b84 | 4744.661139564 |
| PAXG / XAUt 0.05% | uniswap-v4-ethereum | 0x4bb2...2239 | 4777.8649541606 |
| PAXG / XAUt 0.05% | uniswap_v3 | 0xed7e...aa3e | 4815.9279572459 |
| XAUt / PAXG | curve | 0xc48a...15ee | 4767.80474934957 |
| PAXG / USDC 0.05% | uniswap-v4-ethereum | 0xc581...6acd | 4770.2851231771 |
| PAXG / USDC 0.3% | uniswap_v3 | 0xb431...c0c4 | 4777.0429441646 |
| PAXG / USDT 0.05% | uniswap-v4-ethereum | 0xb9dc...f71b | 4775.1473752259 |
| PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 4782.1795345731 |
| PAXG / XAUt 0.03% | uniswap-v4-ethereum | 0x5c1a...12d4 | 4741.7507628195 |
| PAXG / WBTC 1% | uniswap-v4-ethereum | 0xfd13...fc9c | 4781.7497864324 |
| PAXG / USDC 0.3% | uniswap-v4-ethereum | 0xcc70...2663 | 4767.3806147558 |
| PAXG / ETH 0.3% | uniswap-v4-ethereum | 0x9404...1095 | 4777.2874320054 |
| PAXG / WETH 0.3% | uniswap_v3 | 0x8a7e...66dd | 4773.6104981654 |
| PAXG / cbBTC 0.3% | uniswap_v3 | 0x6179...0be9 | 4761.6234641751 |
| PAXG / USDC | supernova-cl | 0x2110...3d44 | 4773.5597668645 |
| PAXG / WBTC 0.05% | uniswap_v3 | 0xbbc4...3662 | 4774.5830619542 |
| PAXG / WBTC 0.3% | uniswap-v4-ethereum | 0x6ce7...8d3d | 4781.9171097363 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.