Profitable contract call to the exploit was made
Attacker gained $14,424.37
Transaction Details
Network | mainnet |
Attacker Address | 0x19337c8627038c97af80b49e984b18ed2975e5b2 |
Exploit Address | 0xccc2cd01c1ac3257fa30bdf86f7c61ee4c569802 |
Victim Address | 0xb6cbfc7f3ea8f6e231c579acc5c01d664823e37b |
Funding Source | fixedfloat |
Funds Lost | $14,424.37 |
Block | 21050714 |
Timestamp | ( ago) |
| Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
|---|---|---|---|---|---|
| Functions |
|---|
| name() |
| totalSupply() |
| Approve(address,uint256) |
| symbol() |
| receiveFlashLoan(address[],uint256[],uint256[],bytes) |
| Events |
|---|
| No events found |
| Address | Found In |
|---|---|
| 0x19337c8627038c97af80b49e984b18ed2975e5b2 | storage |
| 0xe592427a0aece92de3edee1f18e0157c05861564 | storage |
| 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 | storage |
| 0xba12222222228d8ba445958a75a0704d566bf2c8 | storage |
| External Call | To |
|---|---|
| exactInputSingle((address,address,uint24,address,uint256,uint256,uint256,uint160)) | 0xe592427a0aece92de3edee1f18e0157c05861564 |
| withdraw(uint256) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 |
| approve(address,uint256) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 |
| transfer(address,uint256) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 |
| balanceOf(address) | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 |
| flashLoan(address,address[],uint256[],bytes) | 0xba12222222228d8ba445958a75a0704d566bf2c8 |
| token0() |