Profitable contract call to the exploit was made
Attacker gained $355,222.44
Transaction Details
Network | mainnet |
Attacker Address | 0x27defcfa6498f957918f407ed8a58eba2884768c |
Exploit Address | 0xea55fffae1937e47eba2d854ab7bd29a9cc29170 |
Victim Address | 0xb91ae2c8365fd45030aba84a4666c4db074e53e7 |
Funding Source | railgun |
Funds Lost | $355,222.44 |
Block | 22157900 |
Timestamp | ( ago) |
| Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
|---|---|---|---|---|---|
| Functions |
|---|
| fallback() |
| name() |
| approve(address,uint256) |
| totalSupply() |
| transferFrom(address,address,uint256) |
| decimals() |
| burn(uint256) |
| balanceOf(address) |
| symbol() |
| mint(uint256) |
| transfer(address,uint256) |
| allowance(address,address) |
| Events |
|---|
| Approval(address,address,uint256) |
| Transfer(address,address,uint256) |
| Address | Found In |
|---|---|
| 0xc36442b4a4522e871399cd717abdd847ab11fe88 | bytecode |
| 0xb27308f9f90d607463bb33ea1bebb41c27ce5ab6 | bytecode |
| 0xe592427a0aece92de3edee1f18e0157c05861564 | bytecode |
| 0x27defcfa6498f957918f407ed8a58eba2884768c | storage |
| External Call | To |
|---|---|
| mint(uint256) | |
| exactInputSingle((address,address,uint24,address,uint256,uint256,uint256,uint160)) | |
| approve(address,uint256) |