Transaction Hash:
Block:
18391860 at Oct-20-2023 01:34:11 PM +UTC
Transaction Fee:
0.00219223860634899 ETH
$6.04
Gas Used:
89,521 Gas / 24.48854019 Gwei
Emitted Events:
318 |
VitalikPunks.Transfer( from=0x00000000...000000000, to=[Sender] 0xde56d0016a12d9db9ba27d14cc1598d3cdd09f39, tokenId=2508 )
|
Account State Difference:
Address | Before | After | State Difference | ||
---|---|---|---|---|---|
0x4838B106...B0BAD5f97
Miner
| (Titan Builder) | 14.461786608705180023 Eth | 14.461795560805180023 Eth | 0.0000089521 | |
0xB117Fa20...bDE7388A5 | 0.00352 Eth | 0.0044 Eth | 0.00088 | ||
0xDE56D001...3cdD09f39 |
0.005842779747848044 Eth
Nonce: 58
|
0.002770541141499054 Eth
Nonce: 59
| 0.00307223860634899 |
Execution Trace
ETH 0.00088
VitalikPunks.mint( _mintAmount=1 )
mint[VitalikPunks (ln:1392)]
totalSupply[VitalikPunks (ln:1394)]
totalSupply[VitalikPunks (ln:1398)]
_safeMint[VitalikPunks (ln:1402)]
_msgSender[VitalikPunks (ln:1402)]
totalSupply[VitalikPunks (ln:1404)]
updateParameters[VitalikPunks (ln:1405)]
1234567891011121314151617181920212223242526// SPDX-License-Identifier: MIT// File: @openzeppelin/contracts/security/ReentrancyGuard.sol// OpenZeppelin Contracts v4.4.1 (security/ReentrancyGuard.sol)pragma solidity ^0.8.0;/*** @dev Contract module that helps prevent reentrant calls to a function.** Inheriting from `ReentrancyGuard` will make the {nonReentrant} modifier* available, which can be applied to functions to make sure there are no nested* (reentrant) calls to them.** Note that because there is a single `nonReentrant` guard, functions marked as* `nonReentrant` may not call one another. This can be worked around by making* those functions `private`, and then adding `external` `nonReentrant` entry* points to them.** TIP: If you would like to learn more about reentrancy and alternative ways* to protect against it, check out our blog post* https://blog.openzeppelin.com/reentrancy-after-istanbul/[Reentrancy After Istanbul].*/abstract contract ReentrancyGuard {