| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| PAXG / USDC 0.05% | uniswap_v3 | 0x5ae1...4082 | 4208.16648913135 |
| PAXG / WETH | uniswap_v2 | 0x9c4f...7c4c | 4209.05941344966 |
| PAXG / XAUt | fluid-ethereum | 0x218c...4b84 | 4213.23863025309 |
| PAXG / XAUt 0.05% | uniswap-v4-ethereum | 0x4bb2...2239 | 4227.8871352532 |
| XAUt / PAXG | curve | 0xc48a...15ee | 4193.88436920926 |
| PAXG / XAUt 0.05% | uniswap_v3 | 0xed7e...aa3e | 4227.87012523519 |
| PAXG / WETH 0.3% | uniswap_v3 | 0x8a7e...66dd | 4207.39462127263 |
| PAXG / DAI 0.05% | uniswap-v4-ethereum | 0x6924...39be | 4225.2520183958 |
| PAXG / USDT 0.05% | uniswap-v4-ethereum | 0xb9dc...f71b | 4207.6991764471 |
| PAXG / USDC 0.3% | uniswap-v4-ethereum | 0xcc70...2663 | 4206.25335959411 |
| PAXG / XAUt 0.01% | uniswap_v3 | 0xc756...ed42 | 4205.86823519224 |
| PAXG / ETH 0.3% | uniswap-v4-ethereum | 0x9404...1095 | 4222.34184170049 |
| PAXG / XAUt 0.03% | uniswap-v4-ethereum | 0x5c1a...12d4 | 4207.41904250316 |
| PAXG / cbBTC 0.3% | uniswap_v3 | 0x6179...0be9 | 4216.95811064278 |
| PAXG / XAUt 0.01% | uniswap-v4-ethereum | 0x083e...7591 | 4224.68378583294 |
| PAXG / USDC 0.3% | uniswap_v3 | 0xb431...c0c4 | 4200.24476959094 |
| PAXG / USDC 0.05% | uniswap-v4-ethereum | 0xc581...6acd | 4222.14977943963 |
| PAXG / XGZ 0.01% | uniswap-v4-ethereum | 0xc867...153c | 4222.31145636429 |
| PAXG / ETH 0.02% | uniswap-v4-ethereum | 0x12d4...d6b0 | 4215.86972307861 |
| PAXG / WBTC / USDC 0.3% | balancer-v3-ethereum | 0x6b61...49c5 | 4218.19131903038 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.