POL Price: $0.484412 (+3.38%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] DUP1
  • [2] PUSH1 0x40
  • [3] MSTORE
  • [4] CALLDATASIZE
  • [5] ISZERO
  • [6] PUSH2 0x0016
  • [7] JUMPI
  • [8] JUMPDEST
  • [9] PUSH2 0x0014
  • [10] PUSH2 0x00da
  • [11] JUMP
  • [12] JUMPDEST
  • [13] STOP
  • [14] JUMPDEST
  • [15] PUSH4 0x5c60da1b
  • [16] PUSH1 0xe0
  • [17] SHL
  • [18] DUP2
  • [19] MSTORE
  • [20] PUSH1 0x20
  • [21] DUP2
  • [22] PUSH1 0x04
  • [23] DUP2
  • [24] PUSH32 0x000000000000000000000000124d1506d63cfa6596ed7bcb92f81e9bca4605ef
  • [25] PUSH1 0x01
  • [26] PUSH1 0x01
  • [27] PUSH1 0xa0
  • [28] SHL
  • [29] SUB
  • [30] AND
  • [31] GAS
  • [32] STATICCALL
  • [33] SWAP1
  • [34] DUP2
  • [35] ISZERO
  • [36] PUSH2 0x00ce
  • [37] JUMPI
  • [38] PUSH1 0x00
  • [39] SWAP2
  • [40] PUSH2 0x0071
  • [41] JUMPI
  • [42] JUMPDEST
  • [43] POP
  • [44] PUSH2 0x006b
  • [45] SWAP1
  • [46] PUSH2 0x017d
  • [47] JUMP
  • [48] JUMPDEST
  • [49] CODESIZE
  • [50] PUSH2 0x000c
  • [51] JUMP
  • [52] JUMPDEST
  • [53] PUSH1 0x20
  • [54] SWAP2
  • [55] RETURNDATASIZE
  • [56] DUP4
  • [57] GT
  • [58] PUSH2 0x00c6
  • [59] JUMPI
  • [60] JUMPDEST
  • [61] PUSH1 0x1f
  • [62] DUP4
  • [63] ADD
  • [64] PUSH1 0x1f
  • [65] NOT
  • [66] AND
  • [67] DUP3
  • [68] ADD
  • [69] SWAP1
  • [70] PUSH8 0xffffffffffffffff
  • [71] DUP3
  • [72] GT
  • [73] DUP4
  • [74] DUP4
  • [75] LT
  • [76] OR
  • [77] PUSH2 0x00b2
  • [78] JUMPI
  • [79] POP
  • [80] PUSH1 0x40
  • [81] MSTORE
  • [82] PUSH2 0x006b
  • [83] SWAP2
  • [84] PUSH2 0x00ac
  • [85] SWAP2
  • [86] ADD
  • [87] PUSH2 0x019e
  • [88] JUMP
  • [89] JUMPDEST
  • [90] SWAP1
  • [91] PUSH2 0x0061
  • [92] JUMP
  • [93] JUMPDEST
  • [94] PUSH4 0x4e487b71
  • [95] PUSH1 0xe0
  • [96] SHL
  • [97] DUP2
  • [98] MSTORE
  • [99] PUSH1 0x41
  • [100] PUSH1 0x04
  • [101] MSTORE
  • [102] PUSH1 0x24
  • [103] SWAP1
  • [104] REVERT
  • [105] JUMPDEST
  • [106] RETURNDATASIZE
  • [107] SWAP3
  • [108] POP
  • [109] PUSH2 0x007c
  • [110] JUMP
  • [111] JUMPDEST
  • [112] PUSH1 0x40
  • [113] MLOAD
  • [114] RETURNDATASIZE
  • [115] PUSH1 0x00
  • [116] DUP3
  • [117] RETURNDATACOPY
  • [118] RETURNDATASIZE
  • [119] SWAP1
  • [120] REVERT
  • [121] JUMPDEST
  • [122] PUSH1 0x40
  • [123] MLOAD
  • [124] PUSH4 0x5c60da1b
  • [125] PUSH1 0xe0
  • [126] SHL
  • [127] DUP2
  • [128] MSTORE
  • [129] PUSH1 0x20
  • [130] DUP2
  • [131] PUSH1 0x04
  • [132] DUP2
  • [133] PUSH32 0x000000000000000000000000124d1506d63cfa6596ed7bcb92f81e9bca4605ef
  • [134] PUSH1 0x01
  • [135] PUSH1 0x01
  • [136] PUSH1 0xa0
  • [137] SHL
  • [138] SUB
  • [139] AND
  • [140] GAS
  • [141] STATICCALL
  • [142] DUP1
  • [143] ISZERO
  • [144] PUSH2 0x00ce
  • [145] JUMPI
  • [146] PUSH1 0x00
  • [147] SWAP1
  • [148] PUSH2 0x0133
  • [149] JUMPI
  • [150] JUMPDEST
  • [151] PUSH2 0x0131
  • [152] SWAP2
  • [153] POP
  • [154] PUSH2 0x017d
  • [155] JUMP
  • [156] JUMPDEST
  • [157] JUMP
  • [158] JUMPDEST
  • [159] PUSH1 0x20
  • [160] SWAP1
  • [161] RETURNDATASIZE
  • [162] DUP3
  • [163] GT
  • [164] PUSH2 0x0175
  • [165] JUMPI
  • [166] JUMPDEST
  • [167] PUSH1 0x1f
  • [168] DUP3
  • [169] ADD
  • [170] PUSH1 0x1f
  • [171] NOT
  • [172] AND
  • [173] DUP4
  • [174] ADD
  • [175] SWAP1
  • [176] PUSH8 0xffffffffffffffff
  • [177] DUP3
  • [178] GT
  • [179] DUP5
  • [180] DUP4
  • [181] LT
  • [182] OR
  • [183] PUSH2 0x00b2
  • [184] JUMPI
  • [185] POP
  • [186] PUSH1 0x40
  • [187] MSTORE
  • [188] PUSH2 0x0131
  • [189] SWAP2
  • [190] PUSH2 0x0170
  • [191] SWAP2
  • [192] DUP2
  • [193] ADD
  • [194] SWAP1
  • [195] PUSH2 0x01c5
  • [196] JUMP
  • [197] JUMPDEST
  • [198] PUSH2 0x0127
  • [199] JUMP
  • [200] JUMPDEST
  • [201] RETURNDATASIZE
  • [202] SWAP2
  • [203] POP
  • [204] PUSH2 0x013e
  • [205] JUMP
  • [206] JUMPDEST
  • [207] SWAP1
  • [208] POP
  • [209] PUSH1 0x00
  • [210] DUP1
  • [211] DUP1
  • [212] SWAP3
  • [213] CALLDATASIZE
  • [214] DUP3
  • [215] DUP1
  • [216] CALLDATACOPY
  • [217] DUP2
  • [218] CALLDATASIZE
  • [219] SWAP2
  • [220] GAS
  • [221] DELEGATECALL
  • [222] RETURNDATASIZE
  • [223] DUP3
  • [224] DUP1
  • [225] RETURNDATACOPY
  • [226] ISZERO
  • [227] PUSH2 0x019a
  • [228] JUMPI
  • [229] RETURNDATASIZE
  • [230] SWAP1
  • [231] RETURN
  • [232] JUMPDEST
  • [233] RETURNDATASIZE
  • [234] SWAP1
  • [235] REVERT
  • [236] JUMPDEST
  • [237] PUSH1 0x20
  • [238] SWAP1
  • [239] PUSH1 0x7f
  • [240] NOT
  • [241] ADD
  • [242] SLT
  • [243] PUSH2 0x01c0
  • [244] JUMPI
  • [245] PUSH1 0x80
  • [246] MLOAD
  • [247] PUSH1 0x01
  • [248] PUSH1 0x01
  • [249] PUSH1 0xa0
  • [250] SHL
  • [251] SUB
  • [252] DUP2
  • [253] AND
  • [254] DUP2
  • [255] SUB
  • [256] PUSH2 0x01c0
  • [257] JUMPI
  • [258] SWAP1
  • [259] JUMP
  • [260] JUMPDEST
  • [261] PUSH1 0x00
  • [262] DUP1
  • [263] REVERT
  • [264] JUMPDEST
  • [265] SWAP1
  • [266] DUP2
  • [267] PUSH1 0x20
  • [268] SWAP2
  • [269] SUB
  • [270] SLT
  • [271] PUSH2 0x01c0
  • [272] JUMPI
  • [273] MLOAD
  • [274] PUSH1 0x01
  • [275] PUSH1 0x01
  • [276] PUSH1 0xa0
  • [277] SHL
  • [278] SUB
  • [279] DUP2
  • [280] AND
  • [281] DUP2
  • [282] SUB
  • [283] PUSH2 0x01c0
  • [284] JUMPI
  • [285] SWAP1
  • [286] JUMP
  • [287] 'fe'(Unknown Opcode)
  • [288] LOG2
  • [289] PUSH5 0x6970667358
  • [290] '22'(Unknown Opcode)
  • [291] SLT
  • [292] SHA3
  • [293] 'c4'(Unknown Opcode)
  • [294] PUSH25 0xb1615b0d76011a7874324ac15b3d7fb464e980c3c09d2d779b
  • [295] PUSH3 0xa970e1
  • [296] DUP7
  • [297] PUSH5 0x736f6c6343
  • [298] STOP
  • [299] ADDMOD
  • [300] GT
  • [301] STOP
  • [302] CALLER