Attack transaction

0x5e694707337cca979d18f9e45f40e81d6ca341ed342f1377f563e779a746460dBlock Explorer Link
AIZPT Incident

Contract call to the exploit was made

Attacker called function 0x69b0f29c on the exploit contract

Attack Steps

  1. Funding

    +0.1 BNB
  2. 6 months

  3. Exploit Contract Deployment

  4. a few seconds

  5. Attack Transaction

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
uniswapV2Call(address,uint256,uint256,bytes)
DPPFlashLoanCall(address,uint256,uint256,bytes)
DVMFlashLoanCall(address,uint256,uint256,bytes)
withdraw(address,uint256)
balanceOf(address,address)
Events
No events found
External CallTo
withdraw(uint256)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
transfer(address,uint256)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
approve(address,uint256)0x55d398326f99059ff775485246999027b3197955
transfer(address,uint256)0x812ba41e071c7b7fa4ebcfb62df5f45f6fa853ee
deposit()0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
approve(address,uint256)0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2
swap(uint256,uint256,address,bytes)0x6a516271870a48f4f6c72044ca64ec9c69ac4efc
balanceOf(address)0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2
swapExactTokensForTokensSupportingFeeOnTransferTokens(uint256,uint256,address[],address,uint256)0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
approve(address,uint256)0x812ba41e071c7b7fa4ebcfb62df5f45f6fa853ee
balanceOf(address)0x812ba41e071c7b7fa4ebcfb62df5f45f6fa853ee
balanceOf(address)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
flash(address,uint256,uint256,bytes)
_BASE_TOKEN_()
flashLoan(uint256,uint256,address,bytes)