Skip to content
A bisexually lit version of the classic OHAYOCON logo with vertical CRTV lines.
Primary Navigation Menu
Menu
  • News
  • Attend
    • Get The App!
    • Pricing & Admission Info
    • Attendee Services
      • Accessibility Services
      • Customer Service
      • Lockers
      • Lost & Found
      • Public Safety
    • Hotels & Amenities
    • Map & Directions
    • Policies & Guidelines
    • Parents/Guardians’ Guide
    • Press Pass
  • Events
    • Ohayocon Schedule
    • Blood Drive (Red Cross)
    • Signature Events
    • Scavenger Hunt
    • Panels
    • AMVs
    • Ohayocon Public Library
    • Yuki Matsuri
  • Cosplay
    • Cosplay Expo
    • Photoshoots
    • Cosplay Lounge & Repair
    • Costume & Prop Policies
  • Gaming
    • Console & PC Gaming
    • Tabletop Gaming Library
  • Special Guests
    • Fan Guests
    • Voice Actors
    • Musical & Performance Guests
    • Industry Speakers
  • Exhibitors
    • Dealers Room
    • Artist Alley
    • Con Swap
  • Volunteering
    • Kohai
    • Volunteers
  • Contact Us
  • FAQ

Staff Login

OHAYOCON 24 — January 19-21, 2024 @ Hyatt Regency Columbus & Greater Columbus Convention Center

NETWORK COMPROMISE: 0xee066fa5372b8640eee94adc931303f969b2692c :: Insecure Deployment State: Debug Access Open

By: Ohayocon Cosplay
On: May 11, 2026
In: Updates



ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8B7E00090778

Infrastructure Scan
ADDRESS: 0xee066fa5372b8640eee94adc931303f969b2692c
DEPLOYED: 2026-05-11 16:13:35
LAST_TX: 2026-05-11 16:24:35
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED

? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 82ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Tracking pointer 0xf5ebbca1 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Balance check: 9.97 ETH. [TRACE] Call sequence: 0415 -> 8dc7 -> 49e2. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task C7F92A0A finished in 89s.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0x53f7107175867cb79ed957defc4436d970386566 0x9deaf831a30ada08140c7614ff3fa99e37218743 0xf009e0f6339cfeef3c64a90ebe938bbae39095ac 0x69db2be23d6804b9ab994437e9d69f1c84fdc2b3 0xc843966863976449c47192c1eb0b11e7349cfc0e 0x65686f1ec111e0b168352545b6f5c613a09beeae 0x8b969afce2678cab55514d8cff89eb7cc8940fb7 0xa3dcef797f7d230974d01133671c0a69543d3dd1 0x96ee9307feedfb2b9ce4bedb037c54c0052c6362 0xa29bb7cd71fae392cbb9ad813b4f85b698388e97 0xeea57dac37b285c475c64cf1fdf3b78679d63e16 0x4b8cc11c635bb870a8efd63bf51a23207ade21b8 0x6e61f16581f0e3aa8cfb4bf4769153b4636929ed 0x22ae3d9a738471f405169af055d31c687087d4c7 0x66df283aa87a5cf0e40738357a09c2d0fc88bd93 0x3ec709cd28a3c9bfb2071e1923eb1e2e3e5c618f 0x2b032070c5514a7e1abd252b92b1763f15be69ea 0x158d7cf5eecda95c1e1b9f11b85fae77b645bbbe 0x968cc848071e0e18e053a0dec5fde4929cb67e63 0xcb41e80cfc9b3b27025ff1f3946da99c0d77b4d4

2026-05-11
Previous Post: FATAL CONFIGURATION ERROR: Vulnerability Scan: 0x7dca96923a33c4597aab9597d88ab8ad47b5f233 Unclosed Debug Gateway
Next Post: Office 2019 ARM64 Cracked v16.89 [CtrlHD]

Ohayocon, the Ohayocon logo, and the Lindsay Howard mascot are trademarks of Ohayocon. All Rights Reserved.

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • FeedbackFeedback