S Price: $0.535136 (-10.36%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] DUP1
  • [2] PUSH1 0x40
  • [3] MSTORE
  • [4] PUSH32 0x5c60da1b00000000000000000000000000000000000000000000000000000000
  • [5] DUP2
  • [6] MSTORE
  • [7] PUSH1 0x20
  • [8] DUP2
  • [9] PUSH1 0x04
  • [10] DUP2
  • [11] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [12] PUSH32 0x00000000000000000000000009c271b80d35693f1e969c1b1ed0aa2b8176c723
  • [13] AND
  • [14] GAS
  • [15] STATICCALL
  • [16] SWAP1
  • [17] DUP2
  • [18] ISZERO
  • [19] PUSH2 0x0147
  • [20] JUMPI
  • [21] PUSH0 0x
  • [22] SWAP2
  • [23] PUSH2 0x0093
  • [24] JUMPI
  • [25] JUMPDEST
  • [26] POP
  • [27] PUSH0 0x
  • [28] DUP1
  • [29] SWAP2
  • [30] CALLDATASIZE
  • [31] DUP3
  • [32] DUP1
  • [33] CALLDATACOPY
  • [34] DUP2
  • [35] CALLDATASIZE
  • [36] SWAP2
  • [37] GAS
  • [38] DELEGATECALL
  • [39] RETURNDATASIZE
  • [40] PUSH0 0x
  • [41] DUP1
  • [42] RETURNDATACOPY
  • [43] ISZERO
  • [44] PUSH2 0x008f
  • [45] JUMPI
  • [46] RETURNDATASIZE
  • [47] PUSH0 0x
  • [48] RETURN
  • [49] JUMPDEST
  • [50] RETURNDATASIZE
  • [51] PUSH0 0x
  • [52] REVERT
  • [53] JUMPDEST
  • [54] SWAP1
  • [55] POP
  • [56] PUSH1 0x20
  • [57] RETURNDATASIZE
  • [58] PUSH1 0x20
  • [59] GT
  • [60] PUSH2 0x0140
  • [61] JUMPI
  • [62] JUMPDEST
  • [63] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
  • [64] PUSH1 0x1f
  • [65] DUP3
  • [66] ADD
  • [67] AND
  • [68] DUP3
  • [69] ADD
  • [70] DUP3
  • [71] DUP2
  • [72] LT
  • [73] PUSH8 0xffffffffffffffff
  • [74] DUP3
  • [75] GT
  • [76] OR
  • [77] PUSH2 0x0113
  • [78] JUMPI
  • [79] PUSH1 0x20
  • [80] SWAP2
  • [81] DUP4
  • [82] SWAP2
  • [83] PUSH1 0x40
  • [84] MSTORE
  • [85] DUP2
  • [86] ADD
  • [87] SUB
  • [88] SLT
  • [89] PUSH2 0x010f
  • [90] JUMPI
  • [91] MLOAD
  • [92] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [93] DUP2
  • [94] AND
  • [95] DUP2
  • [96] SUB
  • [97] PUSH2 0x010f
  • [98] JUMPI
  • [99] PUSH0 0x
  • [100] PUSH2 0x0075
  • [101] JUMP
  • [102] JUMPDEST
  • [103] PUSH0 0x
  • [104] DUP1
  • [105] REVERT
  • [106] JUMPDEST
  • [107] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [108] PUSH0 0x
  • [109] MSTORE
  • [110] PUSH1 0x41
  • [111] PUSH1 0x04
  • [112] MSTORE
  • [113] PUSH1 0x24
  • [114] PUSH0 0x
  • [115] REVERT
  • [116] JUMPDEST
  • [117] POP
  • [118] RETURNDATASIZE
  • [119] PUSH2 0x00a0
  • [120] JUMP
  • [121] JUMPDEST
  • [122] PUSH1 0x40
  • [123] MLOAD
  • [124] RETURNDATASIZE
  • [125] PUSH0 0x
  • [126] DUP3
  • [127] RETURNDATACOPY
  • [128] RETURNDATASIZE
  • [129] SWAP1
  • [130] REVERT
  • [131] 'fe'(Unknown Opcode)
  • [132] LOG2
  • [133] PUSH5 0x6970667358
  • [134] '22'(Unknown Opcode)
  • [135] SLT
  • [136] SHA3
  • [137] EXP
  • [138] MCOPY
  • [139] SSTORE
  • [140] 'b8'(Unknown Opcode)
  • [141] 'df'(Unknown Opcode)
  • [142] 'eb'(Unknown Opcode)
  • [143] SWAP11
  • [144] 'b8'(Unknown Opcode)
  • [145] 'd8'(Unknown Opcode)
  • [146] '0f'(Unknown Opcode)
  • [147] TSTORE
  • [148] 'b9'(Unknown Opcode)
  • [149] PUSH21 0x3ffec6f2818c904c3cdb62f8c1b4df902f23906473