Contract call to the exploit was made
Attacker called function 0x01fc705d on the exploit contract
Transaction Details
Network | bsc |
Attacker Address | 0xc468d9a3a5557bff457586438c130e3afbec2ff9 |
Exploit Address | 0xfcecdbc62dee7233e1c831d06653b5bea7845fcc |
Victim Address | 0x49ba6c20d3e95374fc1b19d537884b5595aa6124 |
Funding Source | tornado |
Funds Lost | $8,272.97 |
Block | 38488209 |
Timestamp | ( ago) |
Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
---|---|---|---|---|---|
Functions |
---|
upgradeTo(address) |
upgradeToAndCall(address,bytes) |
implementation() |
changeAdmin(address) |
admin() |
fallback() |
Events |
---|
AdminChanged(address,address) |
Upgraded(address) |
Address | Found In |
---|---|
0x5754276d6ce002cdf0f26a2e0e2d396a8a17ed20 (ProxyAdmin) | storage |
0xdb5055037125554553ca327cfa97a3acb8df814c | storage |
External Call | To |
---|---|
No external calls found |