Logo

Attack transaction

0xa329b27fbe0f7b7f92060a9e5370fdf03d60e5c4835f09d7234e5bbecf417ccfBlock Explorer Link

Contract call to the exploit was made

Attacker called function 0x6306e50a on the exploit contract

Attack Steps

  1. Funding

    +3.0 ETH
  2. 4 minutes

  3. Exploit Contract Deployment

  4. 2 minutes

  5. Attack Transaction

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
onERC721Received(address,address,uint256,bytes)
killMe()
exec(address,bytes)
claimTokens(address)
fallback()
Events
No events found
AddressLabelFound InIs called
0x4d0d746e0f66bf825418e6b3def1a46ec3c0b847storage