APE Price: $0.49 (-10.90%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] PUSH1 0x04
  • [4] CALLDATASIZE
  • [5] LT
  • [6] PUSH2 0x0021
  • [7] JUMPI
  • [8] PUSH0 0x
  • [9] CALLDATALOAD
  • [10] PUSH1 0xe0
  • [11] SHR
  • [12] DUP1
  • [13] PUSH4 0xd1d80fdf
  • [14] EQ
  • [15] PUSH2 0x0057
  • [16] JUMPI
  • [17] PUSH2 0x0028
  • [18] JUMP
  • [19] JUMPDEST
  • [20] CALLDATASIZE
  • [21] PUSH2 0x0028
  • [22] JUMPI
  • [23] STOP
  • [24] JUMPDEST
  • [25] CALLVALUE
  • [26] DUP1
  • [27] ISZERO
  • [28] PUSH2 0x0033
  • [29] JUMPI
  • [30] PUSH0 0x
  • [31] PUSH0 0x
  • [32] REVERT
  • [33] JUMPDEST
  • [34] POP
  • [35] PUSH0 0x
  • [36] CALLDATASIZE
  • [37] PUSH1 0x60
  • [38] CALLDATASIZE
  • [39] PUSH0 0x
  • [40] PUSH0 0x
  • [41] CALLDATACOPY
  • [42] PUSH0 0x
  • [43] PUSH0 0x
  • [44] CALLDATASIZE
  • [45] PUSH0 0x
  • [46] PUSH0 0x
  • [47] SLOAD
  • [48] GAS
  • [49] DELEGATECALL
  • [50] RETURNDATASIZE
  • [51] PUSH0 0x
  • [52] PUSH0 0x
  • [53] RETURNDATACOPY
  • [54] DUP1
  • [55] DUP1
  • [56] ISZERO
  • [57] PUSH2 0x0053
  • [58] JUMPI
  • [59] RETURNDATASIZE
  • [60] PUSH0 0x
  • [61] RETURN
  • [62] JUMPDEST
  • [63] RETURNDATASIZE
  • [64] PUSH0 0x
  • [65] REVERT
  • [66] JUMPDEST
  • [67] CALLVALUE
  • [68] DUP1
  • [69] ISZERO
  • [70] PUSH2 0x0062
  • [71] JUMPI
  • [72] PUSH0 0x
  • [73] PUSH0 0x
  • [74] REVERT
  • [75] JUMPDEST
  • [76] POP
  • [77] PUSH2 0x0076
  • [78] PUSH2 0x0071
  • [79] CALLDATASIZE
  • [80] PUSH1 0x04
  • [81] PUSH2 0x00dd
  • [82] JUMP
  • [83] JUMPDEST
  • [84] PUSH2 0x0078
  • [85] JUMP
  • [86] JUMPDEST
  • [87] STOP
  • [88] JUMPDEST
  • [89] CALLER
  • [90] PUSH20 0x59ca61a9a253bf8c9e6059d8c3f9934f947b52cd
  • [91] EQ
  • [92] PUSH2 0x0097
  • [93] JUMPI
  • [94] PUSH0 0x
  • [95] PUSH0 0x
  • [96] REVERT
  • [97] JUMPDEST
  • [98] PUSH0 0x
  • [99] DUP1
  • [100] SLOAD
  • [101] PUSH32 0xffffffffffffffffffffffff0000000000000000000000000000000000000000
  • [102] AND
  • [103] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [104] SWAP3
  • [105] SWAP1
  • [106] SWAP3
  • [107] AND
  • [108] SWAP2
  • [109] SWAP1
  • [110] SWAP2
  • [111] OR
  • [112] SWAP1
  • [113] SSTORE
  • [114] JUMP
  • [115] JUMPDEST
  • [116] PUSH0 0x
  • [117] PUSH1 0x20
  • [118] DUP3
  • [119] DUP5
  • [120] SUB
  • [121] SLT
  • [122] ISZERO
  • [123] PUSH2 0x00ed
  • [124] JUMPI
  • [125] PUSH0 0x
  • [126] PUSH0 0x
  • [127] REVERT
  • [128] JUMPDEST
  • [129] DUP2
  • [130] CALLDATALOAD
  • [131] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [132] DUP2
  • [133] AND
  • [134] DUP2
  • [135] EQ
  • [136] PUSH2 0x0110
  • [137] JUMPI
  • [138] PUSH0 0x
  • [139] PUSH0 0x
  • [140] REVERT
  • [141] JUMPDEST
  • [142] SWAP4
  • [143] SWAP3
  • [144] POP
  • [145] POP
  • [146] POP
  • [147] JUMP
  • [148] 'fe'(Unknown Opcode)
  • [149] LOG2
  • [150] PUSH5 0x6970667358
  • [151] '22'(Unknown Opcode)
  • [152] SLT
  • [153] SHA3
  • [154] 'b2'(Unknown Opcode)
  • [155] JUMPI
  • [156] '4e'(Unknown Opcode)
  • [157] 'dc'(Unknown Opcode)
  • [158] COINBASE
  • [159] GT
  • [160] 'e9'(Unknown Opcode)
  • [161] DUP2
  • [162] DUP6
  • [163] PUSH0 0x
  • [164] 'f8'(Unknown Opcode)
  • [165] JUMPDEST
  • [166] 'd1'(Unknown Opcode)
  • [167] GT
  • [168] 'cf'(Unknown Opcode)
  • [169] SWAP3
  • [170] EXTCODECOPY
  • [171] 'b0'(Unknown Opcode)
  • [172] '4c'(Unknown Opcode)
  • [173] '1f'(Unknown Opcode)
  • [174] LOG2
  • [175] LT
  • [176] '2a'(Unknown Opcode)
  • [177] 'c8'(Unknown Opcode)
  • [178] 'b1'(Unknown Opcode)
  • [179] '2c'(Unknown Opcode)
  • [180] EXTCODECOPY
  • [181] PUSH15 0x2c564eaf64736f6c634300081b0033