| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| sdPENDLE / PENDLE | curve | 0x26f3...a8c0 | 2.19524025441413 |
| UNI / PENDLE 0.3% | uniswap-v4-ethereum | 0x5426...c665 | 2.1869658912837 |
| LDO / PENDLE 1% | uniswap-v4-ethereum | 0x96b9...f0c1 | 2.1661246908765 |
| PENDLE / WETH 0.05% | cypher | 0x177f...fd65 | 2.1725638273511 |
| PENDLE / WETH 0.3% | uniswap_v3 | 0x57af...aacb | 2.18358288716677 |
| PENDLE / WETH | sushiswap | 0x3792...8e43 | 2.17502683088433 |
| ETH / PENDLE 0.3% | uniswap-v4-ethereum | 0xd790...042c | 2.18804254144582 |
| PENDLE / COMP 0.3% | uniswap_v3 | 0x7b15...6f5a | 2.17111664015214 |
| USDC / PENDLE 0.3% | uniswap-v4-ethereum | 0xd2ad...c0c9 | 2.17133010959611 |
| USDC / PENDLE 1% | uniswap_v3 | 0xeabd...7904 | 2.22232951667504 |
| ZIK / PENDLE 1% | uniswap-v4-ethereum | 0x39b9...6ff8 | 2.23170340882649 |
| PENDLE / WETH 1% | balancer_ethereum | 0xfd1c...bbc9 | 2.20678672067059 |
| USDT / PENDLE 0.3% | uniswap-v4-ethereum | 0x47e4...1f86 | 2.19604767052458 |
| PENDLE / WETH 1% | pancakeswap-v3-ethereum | 0xcad4...d195 | 2.21109898431851 |
| PENDLE / WETH | uniswap_v2 | 0x5900...0c79 | 2.19272728525306 |
| PENDLE / USDC | sushiswap | 0xf320...6e15 | 2.11864982458652 |
| RNDR / PENDLE 0.3% | uniswap_v3 | 0x4421...dc5b | 2.217423591 |
| LINK / PENDLE 1% | uniswap-v4-ethereum | 0x0e83...1171 | 2.2859124711 |
| WBTC / PENDLE 0.3% | uniswap-v4-ethereum | 0x294c...e2c5 | 3.1971145577 |
| AAVE / PENDLE 0.3% | uniswap-v4-ethereum | 0x8772...cf50 | 1.8221657621 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.