Online Solidity Decompiler

« Decompile another contract

Address

0xe14b40c23f0974550e810841ab9cf5b1b378748d [etherscan.io | etherchain.org]

Public Methods

No public methods detected.

Internal Methods

No internal methods detected.

Decompilation

This might be constructor bytecode - to get at the deployed contract, go back and remove the constructor prefix, usually up to the next 6060 or 6080.
contract Contract { function main() { // Unhandled termination } }

Disassembly

label_0000: 0000 EF EF // Stack delta = +0 // Block terminates 0001 01 ADD 0002 00 *STOP 0003 9E SWAP15 0004 21 21 0005 52 MSTORE 0006 FB FB 0007 DE DE 0008 AF AF 0009 38 CODESIZE 000A A9 A9 000B 38 CODESIZE 000C 09 MULMOD 000D D4 D4 000E B8 B8 000F 9C SWAP13 0010 83 DUP4 0011 9E SWAP15 0012 2A 2A 0013 0E 0E 0014 12 SLT 0015 42 TIMESTAMP 0016 BD BD
Found this site useful?
Donations are greatly appreciated!
ETH: 0xB3F04f0c276fa1177c1779f6E1E156B2738ea392
Contact/hire: [email protected]