Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PENDLE / WETH 0.3% | uniswap_v3 | 0x57af...aacb | 4.394659964462 |
PENDLE / WETH 1% | balancer_ethereum | 0xfd1c...bbc9 | 4.26261835711515 |
LDO / PENDLE 1% | uniswap-v4-ethereum | 0x96b9...f0c1 | 4.26449127641932 |
sdPENDLE / PENDLE | curve | 0x26f3...a8c0 | 4.36478782382269 |
PENDLE / WETH | sushiswap | 0x3792...8e43 | 4.38027378815328 |
ETH / PENDLE 0.3% | uniswap-v4-ethereum | 0xd790...042c | 4.31993175336798 |
USDT / PENDLE 0.3% | uniswap-v4-ethereum | 0x47e4...1f86 | 4.39617354094858 |
BANANA / PENDLE 1% | uniswap_v3 | 0x9783...d296 | 4.38830320677661 |
USDC / PENDLE 1% | uniswap_v3 | 0xeabd...7904 | 4.26469973188767 |
OT-SLP-29DEC2022 / PENDLE | sushiswap | 0xb124...3ef4 | 4.9660226554 |
ePendle / PENDLE / ePENDLE/PENDLE 0.3% | balancer_ethereum | 0xa2e9...a884 | 4.43578375139804 |
PENDLE / WETH 1% | kyberswap_elastic | 0xaed9...21e8 | 0.454940056587587216179205889604 |
USDC / PENDLE 0.3% | uniswap-v4-ethereum | 0xd2ad...c0c9 | 4.25607002112636 |
WBTC / PENDLE 0.3% | uniswap-v4-ethereum | 0x294c...e2c5 | 3.1971145577 |
PENDLE / WETH | uniswap_v2 | 0x5900...0c79 | 4.3479381681828 |
PENDLE / WETH 0.05% | uniswap_v3 | 0x5451...e319 | 2.6334473034 |
PENDLE / WETH 1% | pancakeswap-v3-ethereum | 0xcad4...d195 | 2.4735289874317 |
LDO / PENDLE 0.3% | uniswap-v4-ethereum | 0xd7e5...326c | 4.2222490938 |
RNG / PENDLE 0.3% | uniswap_v3 | 0xb35a...d32e | 3.61235851956587 |
PENDLE / WETH 1% | uniswap_v3 | 0x50fe...1134 | 4.42416110311326 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.