The First

Integrate |

Restaking Network

Scale your with secure res.

$ 0

Total Restake

0

Cumulative stake

Supported Networks

Pell lets you restake from many networks.

Choose a network below to get started.

Smart Chain

Stak any, get daily stak and strategies.

1X

Pell Points

$ 0

Stake

B² Network

Stake any, get daily stak

1X

Pell Points

$ 0

Stake

More chains

Pell Network now supports multiple networks beyond.

Workflow

Pell is a meticulously designed multi-layered restake network that offers an excellent user experience, clear role division, and a closed-loop logic chain.
Workflow
Staks

Staks can participate in the Pell Network.

Operators

Operators run AVSs on Pell Network to secure more network‘s ecosystem.

Developers

AVS developers customize slashing and rules for distributed systems.

Key Components

Pell extends the security to additional applications through multiple coordinated components.
Pell Restaking Protocol

A suite of deployable across multiple networks enables stak.

Pell ‘s
Marketplace

Any service provider can leverage security by offering to Pell AVS operators

Pell Restaking

A specially designed for managing the Pell Restaking Protocol

The Pell Network Client

A binary run locally by operators, effectively creating a p2p validation network

About Pell Ecosystem

1

Restaking build a trust through stake, providing shared security and forming of the Pell Network.

2

Actively Validated Services (AVSs) use restake to superpower their functionality.

3

Ecosystem layer benefit from new modular services delivered by AVSs.

4

Operators perform validation tasks upon which AVSs rely.

Discover and explore cutting-edge web services, networks, protocols, and applications being built within the Pell ecosystem

Do you need programmable trust in your distributed system?

About Pell Ecosystem

Ecosystem Synergy

Promote ecosystem development, reduce dev cost for builders to let them focus on business logic rather than security infra.
Improve ecosystem diversity and security, speed up implementation of new technology, supported by security.

© 2024 Pell Network . All rights reserved.