ETH Price: $2,540.42 (-0.75%)

Transaction Decoder

Block:
18309954 at Oct-09-2023 02:32:35 AM +UTC
Transaction Fee:
0.000627033402595644 ETH $1.59
Gas Used:
117,206 Gas / 5.349840474 Gwei

Account State Difference:

  Address   Before After State Difference Code
(MEV Builder: 0xcDA...062)
52.627153189825473868 Eth52.627159050125473868 Eth0.0000058603
0xCeaA0341...f7e9E7Be5
0xF9e39FD3...ccD0096dE
0.00122474724278777 Eth
Nonce: 0
0.000597713840192126 Eth
Nonce: 1
0.000627033402595644

Execution Trace

GenslerSecuritiesCommission.mint( mintAmount=5 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
// File: @openzeppelin\contracts\security\ReentrancyGuard.sol
// OpenZeppelin Contracts (last updated v4.8.0) (security/ReentrancyGuard.sol)
pragma solidity ^0.8.0;
/**
* @dev Contract module that helps prevent reentrant calls to a function.
*
* Inheriting from `ReentrancyGuard` will make the {nonReentrant} modifier
* available, which can be applied to functions to make sure there are no nested
* (reentrant) calls to them.
*
* Note that because there is a single `nonReentrant` guard, functions marked as
* `nonReentrant` may not call one another. This can be worked around by making
* those functions `private`, and then adding `external` `nonReentrant` entry
* points to them.
*
* TIP: If you would like to learn more about reentrancy and alternative ways
* to protect against it, check out our blog post
* https://blog.openzeppelin.com/reentrancy-after-istanbul/[Reentrancy After Istanbul].
*/
abstract contract ReentrancyGuard {
// Booleans are more expensive than uint256 or any type that takes up a full
// word because each write operation emits an extra SLOAD to first read the
// slot's contents, replace the bits taken up by the boolean, and then write
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX