| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Cake / USDC 0.25% | pancakeswap-v3-ethereum | 0x11a6...9732 | 1.3510213961 |
| Cake / WETH 0.25% | pancakeswap-v3-ethereum | 0x517f...f046 | 1.3412246826 |
| ZIK / Cake 1% | pancakeswap-v3-ethereum | 0x1ba0...88f4 | 1.38459759061895 |
| Cake / ZIK 1% | uniswap-v4-ethereum | 0xfb13...3ed8 | 1.3938152138 |
| Cake / USDT | pancakeswap_ethereum | 0xc6ee...a60e | 1.3624066044 |
| Cake / CRV 0.05% | pancakeswap-v3-ethereum | 0xa921...567c | 1.3843740762 |
| Cake / WETH 1% | uniswap_v3 | 0x83a5...cac6 | 1.3638697132 |
| Cake / PUTIN 0.25% | pancakeswap-v3-ethereum | 0x7990...63dd | 4.4901229175 |
| lemu / Cake 0.01% | pancakeswap-v3-ethereum | 0xa1bc...33af | 2.473368618 |
| Cake / ETH 40% | uniswap-v4-ethereum | 0x396c...3a0f | 2.0403314551 |
| Cake / USDT 50% | uniswap-v4-ethereum | 0xa916...51bc | 1.191746056 |
| Cake / UNI 1% | uniswap-v4-ethereum | 0x1ad5...9e16 | 0.994352018 |
| Cake / UNI 1% | uniswap_v3 | 0x4013...7332 | 1.2951205046 |
| Cake / SLF | pancakeswap_ethereum | 0xac08...2a36 | 1.3443305515 |
| Cake / ETH 0.3% | uniswap-v4-ethereum | 0x8a8e...69b7 | 2.0496497347 |
| Cake / USDT 0.25% | pancakeswap-v3-ethereum | 0x2412...abe1 | 1.4110376858 |
| ZITR / Cake 0.25% | pancakeswap-v3-ethereum | 0x5367...bd5c | 2.55156392316983 |
| Cake / BALL 0.05% | uniswap-v4-ethereum | 0x722a...483f | 1.4229569412 |
| Cake / QTZ 1% | pancakeswap-v3-ethereum | 0xc213...d941 | 1.4190972377 |
| Cake / FUKU 0.3% | uniswap-v4-ethereum | 0xc2ab...4266 | 1.3544647573 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.