Logo

Attack transaction

0xbc08860cd0a08289c41033bdc84b2bb2b0c54a51ceae59620ed9904384287a38Block Explorer Link
HIGH
suspicious_contract_call_with_profit

Attack Steps

  1. Funding

    +1.0 ETH
  2. 6 hours

  3. Exploit Contract Deployment

  4. 43 minutes

  5. Attack Transaction

    +$1,971,396.50

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
executeOperation(address,uint256,uint256,address,bytes)
fallback()
Events
No events found
AddressLabelFound InIs called
0xdac17f958d2ee523a2206206994597c13d831ec7TetherTokenbytecodestaticcall
0xbebc44782c7db0a1a60cb6fe97d0b483032ff1c7Vyper_contractbytecode
0xd51a44d3fae010294c616388b506acda1bfaae46Vyper_contractbytecode
0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2WETH9bytecodecall, staticcall
0xa0b86991c6218b36c1d19d4a2e9eb0ce3606eb48FiatTokenProxybytecodestaticcall
0x2260fac5e5542a773aa44fbcfedf7c193bc2c599bytecodecall, staticcall