Transaction Hash:
Block:
18365261 at Oct-16-2023 08:15:35 PM +UTC
Transaction Fee:
0.001418790400954588 ETH
$4.94
Gas Used:
89,521 Gas / 15.848688028 Gwei
Emitted Events:
413 |
VitalikPunks.Transfer( from=0x00000000...000000000, to=[Sender] 0x232d631a0c11db3311909d305d8886f7486d8d00, tokenId=2378 )
|
Account State Difference:
Address | Before | After | State Difference | ||
---|---|---|---|---|---|
0x1f9090aa...8e676c326
Miner
| 1.403988576741513567 Eth | 1.403997528841513567 Eth | 0.0000089521 | ||
0x232d631a...7486D8D00 |
0.038360197654481785 Eth
Nonce: 128
|
0.036061407253527197 Eth
Nonce: 129
| 0.002298790400954588 | ||
0xB117Fa20...bDE7388A5 | 0.20064 Eth | 0.20152 Eth | 0.00088 |
Execution Trace
ETH 0.00088
VitalikPunks.mint( _mintAmount=1 )
mint[VitalikPunks (ln:1392)]
totalSupply[VitalikPunks (ln:1394)]
totalSupply[VitalikPunks (ln:1398)]
_safeMint[VitalikPunks (ln:1402)]
_msgSender[VitalikPunks (ln:1402)]
totalSupply[VitalikPunks (ln:1404)]
updateParameters[VitalikPunks (ln:1405)]
1234567891011121314151617181920212223242526// SPDX-License-Identifier: MIT// File: @openzeppelin/contracts/security/ReentrancyGuard.sol// OpenZeppelin Contracts v4.4.1 (security/ReentrancyGuard.sol)pragma solidity ^0.8.0;/*** @dev Contract module that helps prevent reentrant calls to a function.** Inheriting from `ReentrancyGuard` will make the {nonReentrant} modifier* available, which can be applied to functions to make sure there are no nested* (reentrant) calls to them.** Note that because there is a single `nonReentrant` guard, functions marked as* `nonReentrant` may not call one another. This can be worked around by making* those functions `private`, and then adding `external` `nonReentrant` entry* points to them.** TIP: If you would like to learn more about reentrancy and alternative ways* to protect against it, check out our blog post* https://blog.openzeppelin.com/reentrancy-after-istanbul/[Reentrancy After Istanbul].*/abstract contract ReentrancyGuard {