| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| Cake / WETH 0.25% | pancakeswap-v3-ethereum | 0x517f...f046 | 1.5332863886 |
| Cake / USDC 0.25% | pancakeswap-v3-ethereum | 0x11a6...9732 | 1.5439546138 |
| Cake / USDT | pancakeswap_ethereum | 0xc6ee...a60e | 2.4112609706 |
| Cake / WETH 1% | uniswap_v3 | 0x83a5...cac6 | 1.4912495549 |
| Cake / ZIK 1% | uniswap-v4-ethereum | 0xfb13...3ed8 | 1.5334404779 |
| Cake / PUTIN 0.25% | pancakeswap-v3-ethereum | 0x7990...63dd | 4.4901229175 |
| ZIK / Cake 1% | pancakeswap-v3-ethereum | 0x1ba0...88f4 | 1.54547765384586 |
| lemu / Cake 0.01% | pancakeswap-v3-ethereum | 0xa1bc...33af | 2.473368618 |
| Cake / ETH 40% | uniswap-v4-ethereum | 0x396c...3a0f | 2.0403314551 |
| Cake / USDT 50% | uniswap-v4-ethereum | 0xa916...51bc | 1.191746056 |
| Cake / UNI 1% | uniswap-v4-ethereum | 0x1ad5...9e16 | 0.994352018 |
| Cake / UNI 1% | uniswap_v3 | 0x4013...7332 | 1.2520398105 |
| Cake / CRV 0.05% | pancakeswap-v3-ethereum | 0xa921...567c | 1.3909119506 |
| Cake / USDT 0.25% | pancakeswap-v3-ethereum | 0x2412...abe1 | 1.5445529683 |
| Cake / SLF | pancakeswap_ethereum | 0xac08...2a36 | 1.495532615 |
| Cake / ETH 0.3% | uniswap-v4-ethereum | 0x8a8e...69b7 | 2.0496497347 |
| ZITR / Cake 0.25% | pancakeswap-v3-ethereum | 0x5367...bd5c | 2.55156392316983 |
| Cake / BALL 0.05% | uniswap-v4-ethereum | 0x722a...483f | 1.5901159891 |
| Cake / QTZ 1% | pancakeswap-v3-ethereum | 0xc213...d941 | 1.5792999087 |
| Cake / FUKU 0.3% | uniswap-v4-ethereum | 0xc2ab...4266 | 1.5873334111 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.