Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PENDLE / WETH 0.3% | uniswap_v3 | 0x57af...aacb | 2.98783939415009 |
PENDLE / WETH 1% | balancer_ethereum | 0xfd1c...bbc9 | 2.95392052127166 |
sdPENDLE / PENDLE | curve | 0x26f3...a8c0 | 2.87534882310539 |
PENDLE / WETH | sushiswap | 0x3792...8e43 | 2.98498442243691 |
ETH / PENDLE 0.3% | uniswap-v4-ethereum | 0xd790...042c | 2.98272117267337 |
WBTC / PENDLE 0.3% | uniswap_v3 | 0x0292...3e3a | 2.99347221472783 |
USDC / PENDLE 1% | uniswap_v3 | 0xeabd...7904 | 2.94531874537838 |
PENDLE / WETH 1% | uniswap_v3 | 0x50fe...1134 | 2.87852570272322 |
BANANA / PENDLE 0.3% | uniswap_v3 | 0x9f3a...0ff4 | 2.97921125035728 |
BANANA / PENDLE 1% | uniswap_v3 | 0x9783...d296 | 2.97921125035728 |
PENDLE / WETH | uniswap_v2 | 0x5900...0c79 | 2.89745930981362 |
OT-SLP-29DEC2022 / PENDLE | sushiswap | 0xb124...3ef4 | 4.9660226554 |
ePendle / PENDLE / ePENDLE/PENDLE 0.3% | balancer_ethereum | 0xa2e9...a884 | 2.50510131051905 |
PENDLE / WETH 1% | kyberswap_elastic | 0xaed9...21e8 | 0.454940056587587216179205889604 |
PENDLE / WETH 0.05% | uniswap_v3 | 0x5451...e319 | 2.6334473034 |
PENDLE / WETH 1% | pancakeswap-v3-ethereum | 0xcad4...d195 | 2.4735289874317 |
RNG / PENDLE 0.3% | uniswap_v3 | 0xb35a...d32e | 3.61235851956587 |
PENDLE / USDC | sushiswap | 0xf320...6e15 | 2.65401292518615 |
USDT / PENDLE 0.3% | uniswap-v4-ethereum | 0x47e4...1f86 | 3.6485525904 |
PENDLE / WETH 0.3% | sushiswap-v3-ethereum | 0x10e8...a4f4 | 2.5251883007 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.