S Price: $0.483876 (+22.40%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x0a
  • [4] PUSH1 0x0c
  • [5] JUMP
  • [6] JUMPDEST
  • [7] STOP
  • [8] JUMPDEST
  • [9] PUSH1 0x18
  • [10] PUSH1 0x14
  • [11] PUSH1 0x1a
  • [12] JUMP
  • [13] JUMPDEST
  • [14] PUSH1 0x9d
  • [15] JUMP
  • [16] JUMPDEST
  • [17] JUMP
  • [18] JUMPDEST
  • [19] PUSH0 0x
  • [20] PUSH32 0x000000000000000000000000c9ec2a09b863d0e3c2c544b827fa013b9f4a2fb0
  • [21] PUSH1 0x01
  • [22] PUSH1 0x01
  • [23] PUSH1 0xa0
  • [24] SHL
  • [25] SUB
  • [26] AND
  • [27] PUSH4 0x5c60da1b
  • [28] PUSH1 0x40
  • [29] MLOAD
  • [30] DUP2
  • [31] PUSH4 0xffffffff
  • [32] AND
  • [33] PUSH1 0xe0
  • [34] SHL
  • [35] DUP2
  • [36] MSTORE
  • [37] PUSH1 0x04
  • [38] ADD
  • [39] PUSH1 0x20
  • [40] PUSH1 0x40
  • [41] MLOAD
  • [42] DUP1
  • [43] DUP4
  • [44] SUB
  • [45] DUP2
  • [46] DUP7
  • [47] GAS
  • [48] STATICCALL
  • [49] ISZERO
  • [50] DUP1
  • [51] ISZERO
  • [52] PUSH1 0x76
  • [53] JUMPI
  • [54] RETURNDATASIZE
  • [55] PUSH0 0x
  • [56] PUSH0 0x
  • [57] RETURNDATACOPY
  • [58] RETURNDATASIZE
  • [59] PUSH0 0x
  • [60] REVERT
  • [61] JUMPDEST
  • [62] POP
  • [63] POP
  • [64] POP
  • [65] POP
  • [66] PUSH1 0x40
  • [67] MLOAD
  • [68] RETURNDATASIZE
  • [69] PUSH1 0x1f
  • [70] NOT
  • [71] PUSH1 0x1f
  • [72] DUP3
  • [73] ADD
  • [74] AND
  • [75] DUP3
  • [76] ADD
  • [77] DUP1
  • [78] PUSH1 0x40
  • [79] MSTORE
  • [80] POP
  • [81] DUP2
  • [82] ADD
  • [83] SWAP1
  • [84] PUSH1 0x98
  • [85] SWAP2
  • [86] SWAP1
  • [87] PUSH1 0xba
  • [88] JUMP
  • [89] JUMPDEST
  • [90] SWAP1
  • [91] POP
  • [92] SWAP1
  • [93] JUMP
  • [94] JUMPDEST
  • [95] CALLDATASIZE
  • [96] PUSH0 0x
  • [97] PUSH0 0x
  • [98] CALLDATACOPY
  • [99] PUSH0 0x
  • [100] PUSH0 0x
  • [101] CALLDATASIZE
  • [102] PUSH0 0x
  • [103] DUP5
  • [104] GAS
  • [105] DELEGATECALL
  • [106] RETURNDATASIZE
  • [107] PUSH0 0x
  • [108] PUSH0 0x
  • [109] RETURNDATACOPY
  • [110] DUP1
  • [111] DUP1
  • [112] ISZERO
  • [113] PUSH1 0xb6
  • [114] JUMPI
  • [115] RETURNDATASIZE
  • [116] PUSH0 0x
  • [117] RETURN
  • [118] JUMPDEST
  • [119] RETURNDATASIZE
  • [120] PUSH0 0x
  • [121] REVERT
  • [122] JUMPDEST
  • [123] PUSH0 0x
  • [124] PUSH1 0x20
  • [125] DUP3
  • [126] DUP5
  • [127] SUB
  • [128] SLT
  • [129] ISZERO
  • [130] PUSH1 0xc9
  • [131] JUMPI
  • [132] PUSH0 0x
  • [133] PUSH0 0x
  • [134] REVERT
  • [135] JUMPDEST
  • [136] DUP2
  • [137] MLOAD
  • [138] PUSH1 0x01
  • [139] PUSH1 0x01
  • [140] PUSH1 0xa0
  • [141] SHL
  • [142] SUB
  • [143] DUP2
  • [144] AND
  • [145] DUP2
  • [146] EQ
  • [147] PUSH1 0xde
  • [148] JUMPI
  • [149] PUSH0 0x
  • [150] PUSH0 0x
  • [151] REVERT
  • [152] JUMPDEST
  • [153] SWAP4
  • [154] SWAP3
  • [155] POP
  • [156] POP
  • [157] POP
  • [158] JUMP
  • [159] 'fe'(Unknown Opcode)
  • [160] LOG2
  • [161] PUSH5 0x6970667358
  • [162] '22'(Unknown Opcode)
  • [163] SLT
  • [164] SHA3
  • [165] SGT
  • [166] 'a5'(Unknown Opcode)
  • [167] PUSH17 0xd1b23d44bc9d61cbffd1d58f99e2b30209
  • [168] '2d'(Unknown Opcode)
  • [169] 'e5'(Unknown Opcode)
  • [170] SWAP11
  • [171] SWAP1
  • [172] PUSH1 0x91
  • [173] CALLER