LOADING...
LOADING...
LOADING...
当前位置:主页 > 知识列表 >

d1bf87c4bd1b725e61592fdf8c3745_GEYDAMBOGAVDCOBWGYXDA

1. “一两拨千金”:Crosswise攻击事件分析

...宇区块链安全实验室监测到 BSC 上 Crosswise 遭遇攻击,此次攻击导致协议损失 87.9 万美元。攻击者仅用 1 个 CRSS token 便获取 Crosswise MasterChef 池中价值 87.9 万美元的 692K 个 CRSS。实验室将对本次事件深入跟踪并进行分析。基础信息攻击交易哈希:0xd02e444d0ef7ff063e3c2cecceba67eae832acf3f9cf817733af9139145f479b攻击者地址...

知识:合约,区块链安全,攻击者,交易哈希

2. 【YAS测试网教程】椰子测试网简易安装教程,一键安装

...信息$ cleos get info { "server_version": "e19afc80", "chain_id": "72d597bd2f1560b544f8c58b3fe87ff02ef26c35eec71ddd51da2dd6ab1fa722", "head_block_num": 200246, "last_irreversible_block_num": 199917, "last_irreversible_block_id": "00030cedb82764131725b3d6ca8d23e8f4973f73b67b895683876062587b96f5", "head_block_id": "00030e3699920b0c69c63116599a69c81493f1ac6ad5985e72629d23a7db5634", "he...

知识:钱包的私钥,公钥,区块同步,私钥

3. [BlockSec DeFi 攻击分析系列之二] 倾囊相送:Sushiswap 手续费被盗

...521124074fed2ae\": \"Swap Exact ETH For Tokens\", \"0xc8653ef0c4658acf3d44059babea07c62578769cac10176e61310f7af04e1597\": \"Approve\", \"0x18ed3e5efeec3e475501786541a4f7602340e5aa6bc6cbf24b9c9aa1062449ac\": \"Add Liquidity ETH\", \"0x42d553b614d0a**ea2cfe95bf2a99d337c07f1b53ac4d7987966fc39817975e6\": \"Approve\", \"0x041463e755e91548b9d6dd1e61519b08f101f...

知识:代币,合约,区块,合约地址

4. 免费空投10000CKB?Nervos测试网代币?如何接收和查看?ckb.pw到底是怎么的存在?

...AB币友_龙之吻0x012529DfF8855f0716F79C4Dd73AB54aCB860BD8忆美0x028044fd2455AB51E7CfF7c5e8c35eEB878D0C9E林华1680x0419D778CF279A7F6869a7314e35B0E84b3A7E73小白起飞0x064C3e9d94Bd387CCe76012519afdEAaaEc7A369哼哼先生0x10280F0503F4574EE2566e1f44992e239B65F38d阿斌搞机0x1a44dCCd6FEd7b4dba84C82A4351c5c3a10Fd541kernel0x2B1b68b3e87e025401E8E199A23333bA0471AEaf胖嫄0x2BFCCb75BD5588191063aad...

知识:币友,币圈,钱包,以太坊地址

5. 故技重施:HundredFinance被黑分析

...DC 之后,攻击者再一次往 USDC 借贷合约转入 1,358,759.278 枚 USDC,又获得 67,937,725.081枚 hUSDC,接着,继续从 USDC 的借贷合约借出 1,209,295.758 枚 USDC。4. 最后攻击者归还从 SushiSwap 借出来的 xDai 和 USDC,剩余的非法获利转到攻击者账户上。MistTrack据慢雾 AML 分析,黑客地址将资金从?XDai 跨链到以太坊后,将代币...

知识:合约,代币,以太坊,攻击者

6. 如何自己去挖比特币

...你的地址),填写以后如图所示:<img src="https://pic4.zhimg.com/50/v2-3ca4688cd87a808665bc12f2677fe2a1_hd.jpg" data-caption="" data-size="normal" data-rawwidth="719" data-rawheight="80" class="origin_image zh-lightbox-thumb" width="719" data-original="https://pic4.zhimg.com/v2-3ca4688cd87a808665bc12f2677fe2a1_r.jpg"/>小编在上面的代码中已经为您配置好了...

知识:挖矿,矿池,区块,比特币

7. 智能合约变量储存机制详解

...25;contract TEST{string a='知道创宇';}from Crypto.Util.number import *b=0xe79fa5e98193e5889be5ae87print(long_to_bytes(b).decode('utf-8'))#知道创宇#0x18 每个汉字占 6 个十六进制位pragma solidity ^0.4.25;contract TEST{string a='Genius only means hard-working all one\'s life.';}此时的存储方式和数组类from Crypto.Util.number import *b=0x47656e697573206f6e6c79206d65616e73206...

知识:智能合约,以太坊,合约,类型

8. 月报 | Acala TC4 7月上线,全新糖果节即将来袭

...;sn=02430e4bf01af0bb024d12db80e6189a&chksm=fe6056cfc917dfd97972343e97018f6e58782acaf464bae3fec921b88621d054e2765cb13490&scene=21#wechat_redirectDeX:https://mp.weixin.qq.com/s?__biz=MzU5NjU0Mjk1MA==&mid=2247484216&idx=1&sn=d6ec1b3a1d59172450d747bab82c4e17&chksm=fe6057b1c917dea787c1e92bf91251b6ced54c7effccc01c1b4ce480b0aea1c094faa0c4b671&scene=21#wechat_redirectdSWF:h...

知识:跨链,ACALA,polkadot

9. 通过使用POA Bridge进行主链与侧链之间的资产转移

...eploying 'Migrations' ---------------------- > transaction hash: 0x44dbbf18d316adb29143d1b3341c1e28b297d144411ee98cb23017270f77b9ed > Blocks: 1 Seconds: 9 > contract address: 0xAC96dc3AC9baB86c7d89a5868096394CB708a6a0 > block number: 4502551 > block timestamp: 1559667943 > account: 0xF0f15Cedc719B5A55470877B0710d5c78169...

知识:合约,以太坊,代币

10. EOSIO 转帐详解

...create '["eostea","10000000 EOS",0,0,0]' -p eostea executed transaction: ae707244932ccd9c3b5a579d1e3875de6c0188d2024447c90df9ad716ad5ac41 248 bytes 104448 cycles # eostea <= eostea::create {"issuer":"eostea","maximum_supply":"10000000 EOS","can_freeze":0,"can_recall":0,"can_whitelist":0} 发布代币:$ cleos push action eostea issue '["eostea","100000 EOS","issue"]' -p ...

知识:代币,合约,账户,网络

11. 首发|CertiK:PickleFinance损失近2000万美元攻击事件分析

...,将当前StrategyCmpdDAIV2中可以被取出的代币(Amount_A)转移到位于0x6949bb624e8e8a90f87cd2058139fcd77d2f3f87地址的PickleJar智能合约中。deleverageToMin()函数以及deleverageUntil()函数StrategyCmpdDAIV2智能合约向PickleJar智能合约转移代币的内部交易截图PickleJar智能合约中的earn()函数第三步:调用位于0x6949bb624e8e8a90f87cd2058139fcd77d2f3f...

知识:智能合约,代币,智能合约地址,合约

12. CertiK:Pickle Finance损失近2000万美元攻击事件分析

...,将当前StrategyCmpdDAIV2中可以被取出的代币(Amount_A)转移到位于0x6949bb624e8e8a90f87cd2058139fcd77d2f3f87地址的PickleJar智能合约中。deleverageToMin()函数以及deleverageUntil()函数StrategyCmpdDAIV2智能合约向PickleJar智能合约转移代币的内部交易截图PickleJar智能合约中的earn()函数第三步:调用位于0x6949bb624e8e8a90f87cd2058139fcd77d2f3f...

知识:智能合约,代币,智能合约地址,合约

13. 在Goerli Meddala的Lighthouse上设置Ethereum 2.0验证节点

...95f5d03a95e7c5d0eb655b2fe3b5495b86d424b4681a200d402c30f233e1edc1846f2837b0dfe7df691fe007236ed1998d178774c9b8bc049be75a2c21038978@95.217.215.48:30303,enode://79e5d36f90ee0314293f4c1b1a4cd9ea13f1acd3d79b5a506870c70b6dbac6f9652ca86455886be854c9a1cfcc00d82cf0fa5d256bf7c40ae1fae0c21b437c7d@13.66.153.22:37912,enode://a9f7bb623c007d2b28038978dac6ebbe945c74f07cc91820c88cc95633b29468ca4708781fc99346a74ee43...

知识:ethereum,以太坊,节点

14. 分析PancakeHunny攻击事件

...室第一时间跟踪本次事件并分析。分析攻击者信息攻击者:0x731821D13414487ea46f1b485cFB267019917689攻击合约:0xa5312796DC20ADd51E41a4034bF1Ed481b708e71第一次攻击tx:0x1b698231965b72f64d55c561634600b087154f71bc73fc775622a45112a94a77被攻击池信息VaultStrategyAlpacaRabbit:0x27d4cA4bB855e435959295ec273FA16FE8CaEa14VaultStrategyAlpacaRabbit(proxy):0xef43313e...

知识:合约,代币,链上,钱包

15. PancakeHunny攻击事件分析

...时间跟踪本次事件并分析。分析ANALYZE攻击者信息攻击者:0x731821D13414487ea46f1b485cFB267019917689攻击合约:0xa5312796DC20ADd51E41a4034bF1Ed481b708e71第一次攻击tx:0x1b698231965b72f64d55c561634600b087154f71bc73fc775622a45112a94a77被攻击池信息VaultStrategyAlpacaRabbit:0x27d4cA4bB855e435959295ec273FA16FE8CaEa14VaultStrategyAlpacaRabbit(proxy):0xef43313e82...

知识:合约,代币,钱包地址,区块链安全