omnia_decodeTransaction
Returns the Transaction.data field of an Ethereum transaction.
Parameters
DATA, 20 bytes
- contract_address. The address of the smart contract called.DATA, variable length
- data. Transaction.data field to be decoded. REQUIREDDATA, 20 bytes
- signer. Address corresponding to the signer of the transaction.
Note: contract_address and signer parameters are not required, but providing them might help to recover more details about the decoded input.
Returns
Object with following details:
Parameter | Description | Notice |
---|---|---|
| It describes the method name in ABI, for example, "transfer". | |
| It describes the parameter type in ABI, for example, "address", "uint256", and "bool". | |
| It describes the parameter name in ABI, for example "_from", "_to", "_value". | |
| It describes the input data in ABI. | |
| It describes the info about the address as a parameter. The info includes: (1) "is_contract" describes whether the address is a contract. "1" means true; "0" means false. (2) "contract_name" describes the contract name if the address is a contract. (3) "standard" describes the standard type of the contract. Example:"erc20". (4) "symbol" describes the token symbol if the address is an ERC20 contract. (5) "name" describes the token name if the address is an ERC20 contract. (6) "malicious_address" describes whether the address is a suspected malicious contract. "1" means true; "0" means that we have not found malicious behavior of this address. | When the address is not a contract ("is_contract"=0), "contract_name", "standard", "symbol", and "name" will return "null". When the address is a contract but not an erc20 contract, "standard", "symbol", and "name" will return "null". |
| The name of the contract that the user is interacting with. | |
| Description of the contract. | |
| It tells if the contract that the user is interacting with is a malicious contract. | |
| It explains the function of the method. | |
| It tells if the transaction that users are signing contains risk. | Even non-malicious, commonly used, well-known contracts can be highly risky if not used properly. |
| It explains why the transaction that users are signing contains risk. | Even non-malicious, commonly used, well-known contracts can be highly risky if not used properly. |
Example
Request
Response
Last updated