Exploit transaction in initcode
Detected exploit transaction in contract deployment initcode
Transaction Details
Network | mainnet |
Attacker Address | 0x2d32f31a058602c96e6120c6f037cc8be4f356b2 |
Exploit Address | 0xed43b1851b4de6870a8b4c1e76447e4e8dba3b34 |
Victim Address | 0x16f75aa4bcab8a8fda2bcab023ca1ae581453ac5 |
Funding Source | tornado |
Funds Lost | $31,947.71 |
Block | 21088818 |
Timestamp | ( ago) |
| Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
|---|---|---|---|---|---|
| Functions |
|---|
| setOwner(address) |
| setExecutor(address) |
| getExecutor() |
| call(address,uint256,bytes) |
| getOwner() |
| USDC() |
| USDT() |
| DAI() |
| receiveFlashLoan(address[],uint256[],uint256[],bytes) |
| Events |
|---|
| No events found |
| External Call | To |
|---|---|
| No external calls found |