| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| XAUt / USDT 0.05% | uniswap_v3 | 0x6546...e5da | 4210.62095112946 |
| XAUt / WBTC 0.3% | uniswap_v3 | 0xe8a1...57ad | 4237.11329369698 |
| PAXG / XAUt | fluid-ethereum | 0x218c...4b84 | 4222.26251477105 |
| GOLDGR / XAUt 0.01% | pancakeswap-v3-ethereum | 0x0c59...7542 | 4228.20180070641 |
| XAUt / PAXG | curve | 0xc48a...15ee | 4177.12220908935 |
| PAXG / XAUt 0.05% | uniswap_v3 | 0xed7e...aa3e | 4206.33502682587 |
| XAUt / USDT 0.044% | uniswap-v4-ethereum | 0x19a0...610d | 4220.35009058074 |
| XAUt / USDT 0.3% | uniswap_v3 | 0xa91f...0791 | 4212.22543679064 |
| PAXG / XAUt 0.03% | uniswap-v4-ethereum | 0x5c1a...12d4 | 4215.1370297832 |
| PAXG / XAUt 0.01% | uniswap_v3 | 0xc756...ed42 | 4211.6934241391 |
| PAXG / XAUt 0.05% | uniswap-v4-ethereum | 0x4bb2...2239 | 4200.52367481044 |
| PAXG / XAUt 0.01% | uniswap-v4-ethereum | 0x083e...7591 | 4203.30668539925 |
| XAUt / USDT 0.01% | uniswap_v3 | 0xe053...35ba | 4233.47371103262 |
| EUROC / XAUt 0.3% | uniswap_v3 | 0xd9b1...7d0f | 4209.46996021492 |
| XAUt / WBTC 0.3% | uniswap-v4-ethereum | 0x5791...031f | 4231.65990735262 |
| QQQon / XAUt 0.3% | uniswap-v4-ethereum | 0x532e...0ca3 | 4224.50908415135 |
| XAUt / WETH 1% | uniswap_v3 | 0x3e04...1767 | 4221.55346830735 |
| XAUt / USDT 0.3% | uniswap-v4-ethereum | 0x1169...f46f | 4248.66722564222 |
| XAUt / ZIK 1% | uniswap-v4-ethereum | 0x9b61...7410 | 4222.73997449955 |
| XAUt / ZIK | uniswap_v2 | 0x5f4f...653a | 4231.56484123197 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.