Attack transaction

0xb375932951c271606360b6bf4287d080c5601f4f59452b0484ea6c856defd6fdBlock Explorer Link
DCF Incident

Profitable contract call to the exploit was made

Attacker gained $442,470.64

Attack Steps

  1. Funding

    +9.1 BNB
  2. 19 days

  3. Exploit Contract Deployment

  4. 7 minutes

  5. Attack Transaction

    +$442,470.64

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
out(address)
pancakeCall(address,uint256,uint256,bytes)
Events
No events found
External CallTo
balanceOf(address)0x55d398326f99059ff775485246999027b3197955
swap(uint256,uint256,address,bytes)0x16b9a82891338f9ba80e2d6970fdda79d1eb0dae
getAmountsOut(uint256,address[])0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
transfer(address,uint256)0x55d398326f99059ff775485246999027b3197955
swap(uint256,uint256,address,bytes)0x8487f846d59f8fb4f1285c64086b47e2626c01b6
getAmountsIn(uint256,address[])0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
swapExactTokensForTokensSupportingFeeOnTransferTokens(uint256,uint256,address[],address,uint256)0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
getReserves()0x8487f846d59f8fb4f1285c64086b47e2626c01b6
flash(address,uint256,uint256,bytes)0x92b7807bf19b7dddf89b706143896d05228f3121
transferFrom(address,address,uint256)
approve(address,uint256)