Exploit transaction in initcode
Detected exploit transaction in contract deployment initcode
Transaction Details
Network | mainnet |
Attacker Address | 0x2d32f31a058602c96e6120c6f037cc8be4f356b2 |
Exploit Address | 0xed43b1851b4de6870a8b4c1e76447e4e8dba3b34 |
Victim Address | 0x16f75aa4bcab8a8fda2bcab023ca1ae581453ac5 |
Funding Source | tornado |
Funds Lost | $31,947.71 |
Block | 21088818 |
Timestamp | ( ago) |
Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
---|---|---|---|---|---|
Functions |
---|
setOwner(address) |
setExecutor(address) |
getExecutor() |
call(address,uint256,bytes) |
getOwner() |
USDC() |
USDT() |
DAI() |
receiveFlashLoan(address[],uint256[],uint256[],bytes) |
Events |
---|
No events found |
Address | Label | Found In | Is called |
---|---|---|---|
0xba12222222228d8ba445958a75a0704d566bf2c8 | Vault | bytecode | |
0x2d32f31a058602c96e6120c6f037cc8be4f356b2 | storage | ||
0xa0b86991c6218b36c1d19d4a2e9eb0ce3606eb48 | FiatTokenProxy | storage | |
0x48759f220ed983db51fa7a8c0d2aab8f3ce4166a | CErc20Delegator | storage | |
0x8e595470ed749b85c6f7669de83eae304c2ec68f | CErc20Delegator | storage | |
0x6b175474e89094c44da98b954eedeac495271d0f | storage | ||
0xdac17f958d2ee523a2206206994597c13d831ec7 | storage |