Profitable contract call to the exploit was made
Attacker gained $14,424.37
Transaction Details
Network | mainnet |
Attacker Address | 0x19337c8627038c97af80b49e984b18ed2975e5b2 |
Exploit Address | 0xccc2cd01c1ac3257fa30bdf86f7c61ee4c569802 |
Victim Address | 0xb6cbfc7f3ea8f6e231c579acc5c01d664823e37b |
Funding Source | fixedfloat |
Funds Lost | $14,424.37 |
Block | 21050714 |
Timestamp | ( ago) |
Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
---|---|---|---|---|---|
Functions |
---|
name() |
totalSupply() |
Approve(address,uint256) |
symbol() |
receiveFlashLoan(address[],uint256[],uint256[],bytes) |
Events |
---|
No events found |
Address | Label | Found In | Is called |
---|---|---|---|
0x19337c8627038c97af80b49e984b18ed2975e5b2 | storage | ||
0xe592427a0aece92de3edee1f18e0157c05861564 | SwapRouter | storage | |
0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 | WETH9 | storage | |
0xba12222222228d8ba445958a75a0704d566bf2c8 | Vault | storage |