Back to Home

HelloWorld

program
0xfea8c4afb885...66e7328b08eb
FrontierDecompiled
Deployed August 7, 2015 (10 years ago)Block 48,681

An early Ethereum contract that returns the string “Hello World!” when called.

Key Facts

Deployer
Linagee(0x3d0768...116c2d)
Deployment Block
48,681
Deployment Date
Aug 7, 2015, 03:23 PM
Code Size
788.0 B

Description

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

The deployed runtime code includes function dispatch logic, memory allocation, and return data construction sufficient to return the UTF-8 string "Hello World!" to callers. The string is embedded directly in the contract’s bytecode and assembled in memory at call time.

The contract also includes owner-gated control flow that allows the deployer to trigger contract self-destruction under specific conditions. Aside from this lifecycle control, the contract’s primary observable behavior is responding to calls with a fixed string value.

This deployment reuses the same executable bytecode seen in nearby blocks, indicating deliberate redeployment of a known-working runtime artifact rather than a one-off experiment.

This contract was deployed shortly after the first executable runtime contract by the same deployer in August 2015. It contains callable logic that responds to function selectors and returns a static UTF-8 string, demonstrating a more expressive example of on-chain execution.

Heuristic Analysis

The following characteristics were detected through bytecode analysis and may not be accurate.

Detected Type: program

Frontier Era

The initial release of Ethereum. A bare-bones implementation for technical users.

Block span: 01,149,999
July 30, 2015March 14, 2016

Bytecode Overview

Opcodes788
Unique Opcodes77
Jump Instructions28
Storage Operations11

External Links