Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PAXG / WETH | uniswap_v2 | 0x9c4f...7c4c | 3472.51571052468 |
PAXG / USDC 0.05% | uniswap_v3 | 0x5ae1...4082 | 3466.93130917217 |
XAUt / PAXG | curve | 0xc48a...15ee | 3446.054370266366270362938885320311398821372909293795277336219136 |
PAXG / XAUt 0.05% | uniswap_v3 | 0xed7e...aa3e | 3452.43169994836 |
PAXG / USDC 0.3% | uniswap_v3 | 0xb431...c0c4 | 3463.84383398585 |
PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 3453.93768734829 |
PAXG / USDC 0.3% | uniswap-v4-ethereum | 0xcc70...2663 | 3456.0545453603 |
PAXG / XAUt 0.05% | uniswap-v4-ethereum | 0x4bb2...2239 | 3474.71126837518 |
PAXG / XAUt 0.03% | uniswap-v4-ethereum | 0x5c1a...12d4 | 3464.61248382105 |
PAXG / WBTC / USDC 0.3% | balancer-v3-ethereum | 0x6b61...49c5 | 3470.66176944336 |
EUROC / PAXG 0.3% | uniswap-v4-ethereum | 0xf5d3...6e3f | 3469.42323293102 |
PAXG / ETH 0.3% | uniswap-v4-ethereum | 0x9404...1095 | 3460.28773024464 |
PAXG / USDC 0.05% | uniswap-v4-ethereum | 0xc581...6acd | 3461.46471210336 |
PAXG / WBTC 0.3% | uniswap-v4-ethereum | 0xbd95...9cae | 3453.86297531788 |
PAXG / XAUt 0.3% | uniswap_v3 | 0xdd4c...04f3 | 3451.82145317377 |
PAXG / XAUt 0.01% | uniswap-v4-ethereum | 0x083e...7591 | 3457.07510967163 |
PAXG / WETH 1% | uniswap_v3 | 0xcb1a...b3d9 | 3452.28147499501 |
PAXG / ODIN | uniswap_v2 | 0x2808...4892 | 3462.11878366073 |
PAXG / WBTC 0.3% | uniswap-v4-ethereum | 0x6ce7...8d3d | 3468.42348940221 |
PAXG / SOTU | uniswap_v2 | 0xa0fa...a5f4 | 3462.02364324619 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.