/
SUSPICIOUS transaction
21.08.2024, 16:24:15
Duration: 32s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
🎁 You have randomly received a free lottery chance 1️⃣ Please visit: https://tgton. net 2️⃣ Click on the "FREE SPIN" button, with a top reward of $25,000 ✅ Thank you for participating in the $TON event
Contract deploy
SUSPICIOUS
Interfaces: [jetton_wallet_governed]
-
Internal message
Value:
0.02 TON
IHR disabled:
true
Created at:
21.08.2024, 16:24:15
Created lt:
48612897000002
Bounced:
false
Bounce:
true
Forward Fee:
0.001001608 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "100"
destination: 0:f38ae54bc77fc68746dfa845cf20765e94e9a75870544017616138e14ef34fcc
response_destination: 0:4b7df3f2f193cfc7d6782aec8a553754b8c66f00db1e85bad5332db82d0a1982
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: |+
        🎁 You have randomly received a free lottery chance

        1️⃣ Please visit: https://tgton. net

        2️⃣ Click on the "FREE SPIN" button, with a top reward of $25,000

        ✅ Thank you for participating in the $TON event

Interfaces:
jetton_wallet_governed
Transaction
Tx hash:
0210a7b8…e90e250a
Prev. tx hash:
Total fee:
0.001048791 TON
Fwd. fee:
0.0019464 TON
Gas fee:
0.0004 TON
Storage fee:
0.000000001 TON
Action fee:
0.00064879 TON
End balance:
0.006086496 TON
Time:
21.08.2024, 16:24:25
Lt:
48612900000001
Prev. tx lt:
48612896000001
Status:
active → active
State hash:
43…90
3e…69
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
0
Gas used:
1000
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0176536 TON
IHR disabled:
true
Created at:
21.08.2024, 16:24:25
Created lt:
48612900000002
Bounced:
false
Bounce:
true
Forward Fee:
0.00129761 TON
Init:
b5ee9c7201010301006e0002013401020842028f452d7a4dfd74066b682365177259ed05734435be76b5fd4bd5d8af2b7c3d68008700801e715ca978eff8d0e8dbf508b9e40ecbd29d34eb0e0a8802ec2c271c29de69f99002c44ea652d4092859c67da44e4ca3add6565b0e2897d640a2c51bfb370d8877fa
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "100"
from: 0:4b7df3f2f193cfc7d6782aec8a553754b8c66f00db1e85bad5332db82d0a1982
response_address: 0:4b7df3f2f193cfc7d6782aec8a553754b8c66f00db1e85bad5332db82d0a1982
forward_ton_amount: "1"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io