Malicious function signatures found in the exploit
Detected malicious function signatures in the exploit contract
Profitable contract call to the exploit was made
Attacker gained $11,444.90
Transaction Details
Network | mainnet |
Attacker Address | 0x5d979d1d5313d5871aa328809ffe40a43e3e0740 |
Exploit Address | 0xbb6ae2feae3edb6d14d2b070303fb1e534a85d32 |
Victim Address | 0x |
Funding Source | railgun |
Funds Lost | $11,444.90 |
Block | 19088268 |
Timestamp | ( ago) |
Flashloans | No events | No tx history | console.log | SELFDESTRUCT | CREATE2 |
---|---|---|---|---|---|
Functions |
---|
name() |
approve(address,uint256) |
exploit(address) |
token0() |
uniswapV2Call(address,uint256,uint256,bytes) |
totalSupply() |
transferFrom(address,address,uint256) |
decimals() |
burn(uint256) |
balanceOf(address) |
symbol() |
mint(uint256) |
transfer(address,uint256) |
killMe() |
exec(address,bytes) |
allowance(address,address) |
claimTokens(address) |
Events |
---|
Approval(address,address,uint256) |
Transfer(address,address,uint256) |
Address | Found In |
---|---|
0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) | bytecode |
0xc36442b4a4522e871399cd717abdd847ab11fe88 (NonfungiblePositionManager) | bytecode |
0xb4e16d0168e52d35cacd2c6185b44281ec28c9dc (UniswapV2Pair) | bytecode |
0xe592427a0aece92de3edee1f18e0157c05861564 (SwapRouter) | bytecode |
0xa0b86991c6218b36c1d19d4a2e9eb0ce3606eb48 (FiatTokenProxy) | bytecode |
0xdb3aa70f9f4d83c6c49c01d18866227e5fd32a7c | bytecode |
0x5d979d1d5313d5871aa328809ffe40a43e3e0740 | storage |
External Call | To |
---|---|
CALL | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) |
STATICCALL | 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 (WETH9) |
CALL | 0xc36442b4a4522e871399cd717abdd847ab11fe88 (NonfungiblePositionManager) |
CALL | 0xb4e16d0168e52d35cacd2c6185b44281ec28c9dc (UniswapV2Pair) |
CALL | 0xe592427a0aece92de3edee1f18e0157c05861564 (SwapRouter) |
STATICCALL | 0xa0b86991c6218b36c1d19d4a2e9eb0ce3606eb48 (FiatTokenProxy) |