Exploit transaction in initcode
Detected exploit transaction in contract deployment initcode
Transaction Details
Network | mainnet |
Attacker Address | 0x2d32f31a058602c96e6120c6f037cc8be4f356b2 |
Exploit Address | 0xed43b1851b4de6870a8b4c1e76447e4e8dba3b34 |
Victim Address | 0x16f75aa4bcab8a8fda2bcab023ca1ae581453ac5 |
Funding Source | tornado |
Funds Lost | $31,947.71 |
Block | 21088818 |
Timestamp | ( ago) |
Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
---|---|---|---|---|---|
Functions |
---|
setOwner(address) |
setExecutor(address) |
getExecutor() |
call(address,uint256,bytes) |
getOwner() |
USDC() |
USDT() |
DAI() |
receiveFlashLoan(address[],uint256[],uint256[],bytes) |
Events |
---|
No events found |
External Call | To |
---|---|
No external calls found |