Profitable contract call to the exploit was made
Attacker gained $14,424.37
Transaction Details
Network | mainnet |
Attacker Address | 0x19337c8627038c97af80b49e984b18ed2975e5b2 |
Exploit Address | 0xccc2cd01c1ac3257fa30bdf86f7c61ee4c569802 |
Victim Address | 0xb6cbfc7f3ea8f6e231c579acc5c01d664823e37b |
Funding Source | fixedfloat |
Funds Lost | $14,424.37 |
Block | 21050714 |
Timestamp | ( ago) |
Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
---|---|---|---|---|---|
Functions |
---|
name() |
totalSupply() |
Approve(address,uint256) |
symbol() |
receiveFlashLoan(address[],uint256[],uint256[],bytes) |
Events |
---|
No events found |
Address | Found In |
---|---|
0x19337c8627038c97af80b49e984b18ed2975e5b2 | storage |
0xe592427a0aece92de3edee1f18e0157c05861564 (SwapRouter) | storage |
0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) | storage |
0xba12222222228d8ba445958a75a0704d566bf2c8 | storage |
External Call | To |
---|---|
exactInputSingle((address,address,uint24,address,uint256,uint256,uint256,uint160)) | 0xe592427a0aece92de3edee1f18e0157c05861564 (SwapRouter) |
withdraw(uint256) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) |
approve(address,uint256) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) |
transfer(address,uint256) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) |
balanceOf(address) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) |
flashLoan(address,address[],uint256[],bytes) | 0xba12222222228d8ba445958a75a0704d566bf2c8 |
token0() |