Attack transaction

0x0039d4db8004d075e1c0aed208079a833c001b8b1b094a00c2a74ee976614ef9Block Explorer Link
UNITAO Incident

Profitable contract call to the exploit was made

Attacker gained $14,424.37

Attack Steps

  1. Funding

    +0.1 ETH
  2. 7 days

  3. Exploit Contract Deployment

  4. 6 minutes

  5. Attack Transaction

    +$14,424.37

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
name()
totalSupply()
Approve(address,uint256)
symbol()
receiveFlashLoan(address[],uint256[],uint256[],bytes)
Events
No events found
External CallTo
exactInputSingle((address,address,uint24,address,uint256,uint256,uint256,uint160))0xe592427a0aece92de3edee1f18e0157c05861564 (SwapRouter)
withdraw(uint256)0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9)
approve(address,uint256)0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9)
transfer(address,uint256)0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9)
balanceOf(address)0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9)
flashLoan(address,address[],uint256[],bytes)0xba12222222228d8ba445958a75a0704d566bf2c8
token0()