S Price: $0.429394 (-1.80%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] DUP1
  • [2] PUSH1 0x40
  • [3] MSTORE
  • [4] PUSH1 0x04
  • [5] CALLDATASIZE
  • [6] LT
  • [7] ISZERO
  • [8] PUSH2 0x0013
  • [9] JUMPI
  • [10] PUSH1 0x00
  • [11] DUP1
  • [12] REVERT
  • [13] JUMPDEST
  • [14] PUSH1 0x00
  • [15] SWAP1
  • [16] DUP2
  • [17] CALLDATALOAD
  • [18] PUSH1 0xe0
  • [19] SHR
  • [20] SWAP1
  • [21] DUP2
  • [22] PUSH4 0x8da5cb5b
  • [23] EQ
  • [24] PUSH2 0x0170
  • [25] JUMPI
  • [26] POP
  • [27] PUSH4 0xf2fde38b
  • [28] EQ
  • [29] PUSH2 0x0037
  • [30] JUMPI
  • [31] PUSH1 0x00
  • [32] DUP1
  • [33] REVERT
  • [34] JUMPDEST
  • [35] CALLVALUE
  • [36] PUSH2 0x016d
  • [37] JUMPI
  • [38] PUSH1 0x20
  • [39] CALLDATASIZE
  • [40] PUSH1 0x03
  • [41] NOT
  • [42] ADD
  • [43] SLT
  • [44] PUSH2 0x016d
  • [45] JUMPI
  • [46] PUSH1 0x04
  • [47] CALLDATALOAD
  • [48] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [49] DUP1
  • [50] DUP3
  • [51] AND
  • [52] DUP1
  • [53] SWAP3
  • [54] SUB
  • [55] PUSH2 0x0169
  • [56] JUMPI
  • [57] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
  • [58] DUP1
  • [59] SLOAD
  • [60] SWAP2
  • [61] DUP3
  • [62] AND
  • [63] SWAP2
  • [64] DUP3
  • [65] CALLER
  • [66] SUB
  • [67] PUSH2 0x00e5
  • [68] JUMPI
  • [69] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
  • [70] AND
  • [71] DUP4
  • [72] OR
  • [73] SWAP1
  • [74] SSTORE
  • [75] PUSH32 0x8be0079c531659141344cd1fd0a4f28419497f9722a3daafe3b4186f6b6457e0
  • [76] DUP4
  • [77] DUP1
  • [78] LOG3
  • [79] DUP1
  • [80] RETURN
  • [81] JUMPDEST
  • [82] PUSH1 0x84
  • [83] PUSH1 0x40
  • [84] MLOAD
  • [85] PUSH32 0x08c379a000000000000000000000000000000000000000000000000000000000
  • [86] DUP2
  • [87] MSTORE
  • [88] PUSH1 0x20
  • [89] PUSH1 0x04
  • [90] DUP3
  • [91] ADD
  • [92] MSTORE
  • [93] PUSH1 0x22
  • [94] PUSH1 0x24
  • [95] DUP3
  • [96] ADD
  • [97] MSTORE
  • [98] PUSH32 0x4c69624469616d6f6e643a204d75737420626520636f6e7472616374206f776e
  • [99] PUSH1 0x44
  • [100] DUP3
  • [101] ADD
  • [102] MSTORE
  • [103] PUSH32 0x6572000000000000000000000000000000000000000000000000000000000000
  • [104] PUSH1 0x64
  • [105] DUP3
  • [106] ADD
  • [107] MSTORE
  • [108] REVERT
  • [109] JUMPDEST
  • [110] DUP3
  • [111] DUP1
  • [112] REVERT
  • [113] JUMPDEST
  • [114] DUP1
  • [115] REVERT
  • [116] JUMPDEST
  • [117] SWAP1
  • [118] POP
  • [119] CALLVALUE
  • [120] PUSH2 0x01c1
  • [121] JUMPI
  • [122] DUP2
  • [123] PUSH1 0x03
  • [124] NOT
  • [125] CALLDATASIZE
  • [126] ADD
  • [127] SLT
  • [128] PUSH2 0x01c1
  • [129] JUMPI
  • [130] PUSH1 0x20
  • [131] SWAP1
  • [132] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [133] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c1320
  • [134] SLOAD
  • [135] AND
  • [136] DUP2
  • [137] MSTORE
  • [138] RETURN
  • [139] JUMPDEST
  • [140] POP
  • [141] DUP1
  • [142] REVERT
  • [143] 'fe'(Unknown Opcode)
  • [144] LOG2
  • [145] PUSH5 0x6970667358
  • [146] '22'(Unknown Opcode)
  • [147] SLT
  • [148] SHA3
  • [149] DUP9
  • [150] 'e7'(Unknown Opcode)
  • [151] SUB
  • [152] 'd3'(Unknown Opcode)
  • [153] ADD
  • [154] SHR
  • [155] LOG3
  • [156] SWAP4
  • [157] 'f8'(Unknown Opcode)
  • [158] BLOBBASEFEE
  • [159] 'b3'(Unknown Opcode)
  • [160] SWAP16
  • [161] NOT
  • [162] SWAP9
  • [163] EXTCODESIZE
  • [164] MSTORE
  • [165] MSIZE
  • [166] LOG0
  • [167] 'd2'(Unknown Opcode)
  • [168] 'aa'(Unknown Opcode)
  • [169] 'a7'(Unknown Opcode)