/
SUSPICIOUS transaction
29.06.2024, 10:10:59
Duration: 28s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
Claim 50.000.000
Transfer token
SUSPICIOUS
Claim 50.000.000
Internal message
Value:
0.05 TON
IHR disabled:
true
Created at:
29.06.2024, 10:10:59
Created lt:
47411660000003
Bounced:
false
Bounce:
true
Forward Fee:
0.000541871 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "2000000002"
destination: 0:b2ce7449893130450415e08733dccd13fca65a67ec7cf2cbedd25d2a3983b55f
response_destination: 0:4f7da1e8444161a55180a6b07dd915bcd990f48c7086571b99dc84b58323d880
custom_payload: null
forward_ton_amount: "0"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: Claim 50.000.000
Interfaces:
jetton_wallet_v2
Transaction
Tx hash:
20896137…cf5a5316
Prev. tx hash:
Total fee:
0.004101281 TON
Fwd. fee:
0.0012568 TON
Gas fee:
0.0036068 TON
Storage fee:
0.000075555 TON
Action fee:
0.000418926 TON
End balance:
0.008479198 TON
Time:
29.06.2024, 10:10:59
Lt:
47411660000004
Prev. tx lt:
46919187000003
Status:
active → active
State hash:
1d…79
5c…a3
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
216
Gas used:
9017
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0451364 TON
IHR disabled:
true
Created at:
29.06.2024, 10:10:59
Created lt:
47411660000005
Bounced:
false
Bounce:
true
Forward Fee:
0.000837874 TON
Init:
b5ee9c7201010301006e000201340102084202ba2918c8947e9b25af9ac1b883357754173e5812f807a3d6e642a14709595395008700801659ce8931262608a082bc10e67b99a27f94cb4cfd8f9e597dba4ba5473076abf000be55850f1185da55e6ebbcb8cb30b5ef060a0fd03482ec0f90cb3580eb0cfff2
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "2000000002"
from: 0:4f7da1e8444161a55180a6b07dd915bcd990f48c7086571b99dc84b58323d880
response_address: 0:4f7da1e8444161a55180a6b07dd915bcd990f48c7086571b99dc84b58323d880
forward_ton_amount: "0"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io