Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PAXG / WETH | uniswap_v2 | 0x9c4f...7c4c | 3314.81601285811 |
PAXG / USDC 0.05% | uniswap_v3 | 0x5ae1...4082 | 3319.35345342094 |
PAXG / USDC 0.3% | uniswap_v3 | 0xb431...c0c4 | 3305.12487727942 |
PAXG / XAUt 0.05% | uniswap_v3 | 0xed7e...aa3e | 3318.74130817591 |
XAUt / PAXG | curve | 0xc48a...15ee | 3315.36100968158 |
PAXG / USDC 0.3% | uniswap-v4-ethereum | 0xcc70...2663 | 3296.8048754548 |
PAXG / XAUt 0.05% | uniswap-v4-ethereum | 0x4bb2...2239 | 3318.74130817591 |
PAXG / cbBTC 0.3% | uniswap-v4-ethereum | 0x3626...a85e | 3312.84488157909 |
PAXG / WBTC 0.3% | uniswap-v4-ethereum | 0x6ce7...8d3d | 3301.49114505027 |
PAXG / WETH 1% | uniswap_v3 | 0xcb1a...b3d9 | 3312.25575229708 |
PAXG / XAUt 0.01% | uniswap-v4-ethereum | 0x083e...7591 | 3314.21689162293 |
PAXG / ODIN | uniswap_v2 | 0x2808...4892 | 3303.74659281011 |
PAXG / SOTU | uniswap_v2 | 0xa0fa...a5f4 | 3325.55085251074 |
DAWAE / PAXG 1% | uniswap_v3 | 0x28d6...752f | 3312.90677338873 |
PAXG / USDC | uniswap_v2 | 0x6d74...1f60 | 3303.04226775605 |
PAXG / WETH | sushiswap | 0xf957...3975 | 3318.5229457219 |
PAXG / XAUt 0.3% | uniswap_v3 | 0xdd4c...04f3 | 3330.16520799085 |
PAXG / BLIZZ 1% | uniswap-v4-ethereum | 0xef32...03e6 | 3290.76377465021 |
PAXG / XAUt 0.3% | uniswap-v4-ethereum | 0x2223...d4ca | 3326.00692309411 |
PAXG / USDC 1% | uniswap_v3 | 0x1d61...696b | 3284.22373469134 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.