POL Price: $0.377678 (+0.59%)
Gas: 36 GWei

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x00
  • [4] CALLDATASIZE
  • [5] PUSH1 0x60
  • [6] PUSH1 0x00
  • [7] DUP1
  • [8] PUSH20 0xd7ef3aad2be0999be362e5cec0c1796af25d9b77
  • [9] PUSH1 0x01
  • [10] PUSH1 0x01
  • [11] PUSH1 0xa0
  • [12] SHL
  • [13] SUB
  • [14] AND
  • [15] DUP6
  • [16] DUP6
  • [17] PUSH1 0x40
  • [18] MLOAD
  • [19] PUSH1 0x38
  • [20] SWAP3
  • [21] SWAP2
  • [22] SWAP1
  • [23] PUSH1 0xce
  • [24] JUMP
  • [25] JUMPDEST
  • [26] PUSH1 0x00
  • [27] PUSH1 0x40
  • [28] MLOAD
  • [29] DUP1
  • [30] DUP4
  • [31] SUB
  • [32] DUP2
  • [33] DUP6
  • [34] GAS
  • [35] DELEGATECALL
  • [36] SWAP2
  • [37] POP
  • [38] POP
  • [39] RETURNDATASIZE
  • [40] DUP1
  • [41] PUSH1 0x00
  • [42] DUP2
  • [43] EQ
  • [44] PUSH1 0x71
  • [45] JUMPI
  • [46] PUSH1 0x40
  • [47] MLOAD
  • [48] SWAP2
  • [49] POP
  • [50] PUSH1 0x1f
  • [51] NOT
  • [52] PUSH1 0x3f
  • [53] RETURNDATASIZE
  • [54] ADD
  • [55] AND
  • [56] DUP3
  • [57] ADD
  • [58] PUSH1 0x40
  • [59] MSTORE
  • [60] RETURNDATASIZE
  • [61] DUP3
  • [62] MSTORE
  • [63] RETURNDATASIZE
  • [64] PUSH1 0x00
  • [65] PUSH1 0x20
  • [66] DUP5
  • [67] ADD
  • [68] RETURNDATACOPY
  • [69] PUSH1 0x76
  • [70] JUMP
  • [71] JUMPDEST
  • [72] PUSH1 0x60
  • [73] SWAP2
  • [74] POP
  • [75] JUMPDEST
  • [76] POP
  • [77] SWAP2
  • [78] POP
  • [79] SWAP2
  • [80] POP
  • [81] DUP2
  • [82] PUSH1 0xc1
  • [83] JUMPI
  • [84] PUSH1 0x40
  • [85] MLOAD
  • [86] PUSH3 0x461bcd
  • [87] PUSH1 0xe5
  • [88] SHL
  • [89] DUP2
  • [90] MSTORE
  • [91] PUSH1 0x20
  • [92] PUSH1 0x04
  • [93] DUP3
  • [94] ADD
  • [95] MSTORE
  • [96] PUSH1 0x13
  • [97] PUSH1 0x24
  • [98] DUP3
  • [99] ADD
  • [100] MSTORE
  • [101] PUSH19 0x151a1a5cc8125d195b481a5cc8131bd8dad959
  • [102] PUSH1 0x6a
  • [103] SHL
  • [104] PUSH1 0x44
  • [105] DUP3
  • [106] ADD
  • [107] MSTORE
  • [108] PUSH1 0x64
  • [109] ADD
  • [110] PUSH1 0x40
  • [111] MLOAD
  • [112] DUP1
  • [113] SWAP2
  • [114] SUB
  • [115] SWAP1
  • [116] REVERT
  • [117] JUMPDEST
  • [118] DUP1
  • [119] MLOAD
  • [120] SWAP5
  • [121] POP
  • [122] PUSH1 0x20
  • [123] ADD
  • [124] SWAP3
  • [125] POP
  • [126] POP
  • [127] POP
  • [128] RETURN
  • [129] JUMPDEST
  • [130] DUP2
  • [131] DUP4
  • [132] DUP3
  • [133] CALLDATACOPY
  • [134] PUSH1 0x00
  • [135] SWAP2
  • [136] ADD
  • [137] SWAP1
  • [138] DUP2
  • [139] MSTORE
  • [140] SWAP2
  • [141] SWAP1
  • [142] POP
  • [143] JUMP
  • [144] 'fe'(Unknown Opcode)
  • [145] LOG2
  • [146] PUSH5 0x6970667358
  • [147] '22'(Unknown Opcode)
  • [148] SLT
  • [149] SHA3
  • [150] PUSH9 0xdc62602a2ac52584ed
  • [151] 'a5'(Unknown Opcode)
  • [152] PUSH25 0x8b9cb9bd1bdedb96931868e8d0ca9efe8e3e28a464736f6c63
  • [153] NUMBER
  • [154] STOP
  • [155] ADDMOD
  • [156] '0d'(Unknown Opcode)
  • [157] STOP
  • [158] CALLER