PapasotHDL Distribution Pool Exploit behavior
    Updated 2022-03-24
    select
    sender,
    block_timestamp,
    try_base64_decode_string(tx_message:txn:apaa[0]::string) as note
    from algorand.application_call_transaction
    where app_id = 596947890 AND
    sender = 'D4EWMVZ52F46RIC72RFTHC4ANPI5DLGELQEFXHSQG3D6LZKVV2LGNPOTKM'
    order by block_timestamp

    Run a query to Download Data