APE Price: $0.57 (+3.22%)

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] CALLDATASIZE
  • [2] ISZERO
  • [3] PUSH2 0x01a2
  • [4] JUMPI
  • [5] PUSH1 0x20
  • [6] DUP1
  • [7] DUP3
  • [8] ADD
  • [9] PUSH32 0xc8fcad8db84d3cc18b4c41d551ea0ee66dd599cde068d998e57d5e09332c131b
  • [10] DUP2
  • [11] MSTORE
  • [12] DUP2
  • [13] DUP4
  • [14] MSTORE
  • [15] PUSH1 0x40
  • [16] DUP4
  • [17] ADD
  • [18] SWAP1
  • [19] DUP4
  • [20] DUP3
  • [21] LT
  • [22] PUSH8 0xffffffffffffffff
  • [23] DUP4
  • [24] GT
  • [25] OR
  • [26] PUSH2 0x0173
  • [27] JUMPI
  • [28] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00
  • [29] SWAP1
  • [30] DUP3
  • [31] PUSH1 0x40
  • [32] MSTORE
  • [33] DUP5
  • [34] MLOAD
  • [35] SWAP1
  • [36] SHA3
  • [37] AND
  • [38] CALLDATASIZE
  • [39] PUSH1 0x04
  • [40] GT
  • [41] PUSH2 0x016e
  • [42] JUMPI
  • [43] PUSH1 0x00
  • [44] SWAP2
  • [45] PUSH1 0x03
  • [46] PUSH32 0xffffffff00000000000000000000000000000000000000000000000000000000
  • [47] DUP5
  • [48] CALLDATALOAD
  • [49] AND
  • [50] SWAP3
  • [51] DUP4
  • [52] DUP6
  • [53] MSTORE
  • [54] ADD
  • [55] DUP5
  • [56] MSTORE
  • [57] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [58] PUSH1 0x40
  • [59] DUP5
  • [60] SHA3
  • [61] SLOAD
  • [62] AND
  • [63] SWAP2
  • [64] DUP3
  • [65] ISZERO
  • [66] PUSH2 0x0140
  • [67] JUMPI
  • [68] DUP5
  • [69] PUSH2 0x0131
  • [70] DUP6
  • [71] DUP6
  • [72] DUP2
  • [73] DUP1
  • [74] PUSH2 0x00e0
  • [75] CALLDATASIZE
  • [76] PUSH2 0x01e5
  • [77] JUMP
  • [78] JUMPDEST
  • [79] PUSH2 0x00ed
  • [80] PUSH1 0x40
  • [81] MLOAD
  • [82] SWAP2
  • [83] DUP3
  • [84] PUSH2 0x01a4
  • [85] JUMP
  • [86] JUMPDEST
  • [87] CALLDATASIZE
  • [88] DUP2
  • [89] MSTORE
  • [90] DUP7
  • [91] DUP2
  • [92] ADD
  • [93] SWAP1
  • [94] CALLDATASIZE
  • [95] DUP4
  • [96] DUP4
  • [97] CALLDATACOPY
  • [98] DUP3
  • [99] DUP9
  • [100] CALLDATASIZE
  • [101] DUP4
  • [102] ADD
  • [103] ADD
  • [104] MSTORE
  • [105] MLOAD
  • [106] SWAP1
  • [107] DUP5
  • [108] GAS
  • [109] DELEGATECALL
  • [110] SWAP1
  • [111] RETURNDATASIZE
  • [112] ISZERO
  • [113] PUSH2 0x0137
  • [114] JUMPI
  • [115] RETURNDATASIZE
  • [116] PUSH2 0x0115
  • [117] DUP2
  • [118] PUSH2 0x01e5
  • [119] JUMP
  • [120] JUMPDEST
  • [121] SWAP1
  • [122] PUSH2 0x0123
  • [123] PUSH1 0x40
  • [124] MLOAD
  • [125] SWAP3
  • [126] DUP4
  • [127] PUSH2 0x01a4
  • [128] JUMP
  • [129] JUMPDEST
  • [130] DUP2
  • [131] MSTORE
  • [132] DUP1
  • [133] SWAP4
  • [134] DUP7
  • [135] RETURNDATASIZE
  • [136] SWAP3
  • [137] ADD
  • [138] RETURNDATACOPY
  • [139] PUSH2 0x021f
  • [140] JUMP
  • [141] JUMPDEST
  • [142] DUP1
  • [143] MLOAD
  • [144] SWAP2
  • [145] ADD
  • [146] RETURN
  • [147] JUMPDEST
  • [148] PUSH1 0x60
  • [149] SWAP3
  • [150] POP
  • [151] PUSH2 0x021f
  • [152] JUMP
  • [153] JUMPDEST
  • [154] PUSH1 0x24
  • [155] SWAP3
  • [156] POP
  • [157] PUSH1 0x44
  • [158] DUP7
  • [159] PUSH32 0x5416eb9800000000000000000000000000000000000000000000000000000000
  • [160] DUP5
  • [161] MSTORE
  • [162] ADD
  • [163] MSTORE
  • [164] REVERT
  • [165] JUMPDEST
  • [166] PUSH1 0x00
  • [167] DUP1
  • [168] REVERT
  • [169] JUMPDEST
  • [170] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [171] PUSH1 0x00
  • [172] MSTORE
  • [173] PUSH1 0x41
  • [174] PUSH1 0x04
  • [175] MSTORE
  • [176] PUSH1 0x24
  • [177] PUSH1 0x00
  • [178] REVERT
  • [179] JUMPDEST
  • [180] STOP
  • [181] JUMPDEST
  • [182] SWAP1
  • [183] PUSH1 0x1f
  • [184] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
  • [185] SWAP2
  • [186] ADD
  • [187] AND
  • [188] DUP2
  • [189] ADD
  • [190] SWAP1
  • [191] DUP2
  • [192] LT
  • [193] PUSH8 0xffffffffffffffff
  • [194] DUP3
  • [195] GT
  • [196] OR
  • [197] PUSH2 0x0173
  • [198] JUMPI
  • [199] PUSH1 0x40
  • [200] MSTORE
  • [201] JUMP
  • [202] JUMPDEST
  • [203] PUSH8 0xffffffffffffffff
  • [204] DUP2
  • [205] GT
  • [206] PUSH2 0x0173
  • [207] JUMPI
  • [208] PUSH1 0x1f
  • [209] ADD
  • [210] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe0
  • [211] AND
  • [212] PUSH1 0x20
  • [213] ADD
  • [214] SWAP1
  • [215] JUMP
  • [216] JUMPDEST
  • [217] SWAP1
  • [218] PUSH2 0x025e
  • [219] JUMPI
  • [220] POP
  • [221] DUP1
  • [222] MLOAD
  • [223] ISZERO
  • [224] PUSH2 0x0234
  • [225] JUMPI
  • [226] DUP1
  • [227] MLOAD
  • [228] SWAP1
  • [229] PUSH1 0x20
  • [230] ADD
  • [231] REVERT
  • [232] JUMPDEST
  • [233] PUSH1 0x04
  • [234] PUSH1 0x40
  • [235] MLOAD
  • [236] PUSH32 0x1425ea4200000000000000000000000000000000000000000000000000000000
  • [237] DUP2
  • [238] MSTORE
  • [239] REVERT
  • [240] JUMPDEST
  • [241] DUP2
  • [242] MLOAD
  • [243] ISZERO
  • [244] DUP1
  • [245] PUSH2 0x02b6
  • [246] JUMPI
  • [247] JUMPDEST
  • [248] PUSH2 0x026f
  • [249] JUMPI
  • [250] POP
  • [251] SWAP1
  • [252] JUMP
  • [253] JUMPDEST
  • [254] PUSH1 0x24
  • [255] SWAP1
  • [256] PUSH20 0xffffffffffffffffffffffffffffffffffffffff
  • [257] PUSH1 0x40
  • [258] MLOAD
  • [259] SWAP2
  • [260] PUSH32 0x9996b31500000000000000000000000000000000000000000000000000000000
  • [261] DUP4
  • [262] MSTORE
  • [263] AND
  • [264] PUSH1 0x04
  • [265] DUP3
  • [266] ADD
  • [267] MSTORE
  • [268] REVERT
  • [269] JUMPDEST
  • [270] POP
  • [271] DUP1
  • [272] EXTCODESIZE
  • [273] ISZERO
  • [274] PUSH2 0x0267
  • [275] JUMP
  • [276] 'fe'(Unknown Opcode)
  • [277] LOG2
  • [278] PUSH5 0x6970667358
  • [279] '22'(Unknown Opcode)
  • [280] SLT
  • [281] SHA3
  • [282] PUSH16 0x9bfbeedc084a9dda94fc279ba559b670
  • [283] 'ae'(Unknown Opcode)
  • [284] SGT
  • [285] '4c'(Unknown Opcode)
  • [286] BLOBHASH
  • [287] SWAP12
  • [288] '2e'(Unknown Opcode)
  • [289] '25'(Unknown Opcode)
  • [290] 'dc'(Unknown Opcode)
  • [291] 'd1'(Unknown Opcode)
  • [292] '23'(Unknown Opcode)
  • [293] CALLDATACOPY
  • [294] GASPRICE
  • [295] 'e0'(Unknown Opcode)
  • [296] '23'(Unknown Opcode)
  • [297] 'b9'(Unknown Opcode)
  • [298] PUSH5 0x736f6c6343
  • [299] STOP
  • [300] ADDMOD
  • [301] OR
  • [302] STOP
  • [303] CALLER