/
SUSPICIOUS transaction
29.06.2024, 00:46:05
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
Wake up, happy owner of the utilitarian NFT Runeston! I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! Just go to the project channel and learn everything about Runeston!
Contract deploy
SUSPICIOUS
Interfaces: [jetton_wallet_v1]
-
Internal message
Value:
0.08918072 TON
IHR disabled:
true
Created at:
29.06.2024, 00:46:05
Created lt:
47402537000002
Bounced:
false
Bounce:
true
Forward Fee:
0.001107209 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 6083770387798738000
amount: "10000000000"
destination: 0:d44be0b3e3a83ca57120933430cf2d23675637b248c3e3c85ddad02d9e283c25
response_destination: 0:abbad8dc662fd3e6ddc8d0e5cdcac3c93464f2881459c1bb883133c40839a2a1
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: >-
        Wake up, happy owner of the utilitarian NFT Runeston!
         I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! 
        Just go to the project channel and learn everything about Runeston!
Interfaces:
jetton_wallet_v1
Transaction
Tx hash:
22e9b478…85d4e295
Prev. tx hash:
Total fee:
0.005157718 TON
Fwd. fee:
0.0050252 TON
Gas fee:
0.0034824 TON
Storage fee:
0.000000277 TON
Action fee:
0.001675041 TON
End balance:
0.002752237 TON
Time:
29.06.2024, 00:46:05
Lt:
47402537000003
Prev. tx lt:
47402224000003
Status:
active → active
State hash:
0a…2d
fb…c7
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
175
Gas used:
8706
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.08067312 TON
IHR disabled:
true
Created at:
29.06.2024, 00:46:05
Created lt:
47402537000004
Bounced:
false
Bounce:
true
Forward Fee:
0.003350159 TON
Init:
b5ee9c720102130100036f00020134020101870801a897c167c750794ae2412668619e5a46ceac6f649187c790bbb5a05b3c50784b0028a08741f25c5a680859df290c88f235842bb2a16c4b0ea4c163a3781444928ee0020114ff00f4a413f4bcf2c80b0302016204050202cc0607001ba0f605da89a1f401f481f481a8610201d408090201200a0b00c30831c02497c138007434c0c05c6c2544d7c0fc03383e903e900c7e800c5c75c87e800c7e800c1cea6d0000b4c7e08403e29fa954882ea54c4d167c0278208405e3514654882ea58c511100fc02b80d60841657c1ef2ea4d67c02f817c12103fcbc2000113e910c1c2ebcb853600201200c0d0083d40106b90f6a2687d007d207d206a1802698fc1080bc6a28ca9105d41083deecbef09dd0958f97162e99f98fd001809d02811e428027d012c678b00e78b6664f6aa401f1503d33ffa00fa4021f001ed44d0fa00fa40fa40d4305136a1522ac705f2e2c128c2fff2e2c254344270542013541403c85004fa0258cf1601cf16ccc922c8cb0112f400f400cb00c920f9007074c8cb02ca07cbffc9d004fa40f40431fa0020d749c200f2e2c4778018c8cb055008cf1670fa0217cb6b13cc80e0201200f10009e8210178d4519c8cb1f19cb3f5007fa0222cf165006cf1625fa025003cf16c95005cc2391729171e25008a813a08209c9c380a014bcf2e2c504c98040fb001023c85004fa0258cf1601cf16ccc9ed5402f73b51343e803e903e90350c0234cffe80145468017e903e9014d6f1c1551cdb5c150804d50500f214013e809633c58073c5b33248b232c044bd003d0032c0327e401c1d3232c0b281f2fff274140371c1472c7cb8b0c2be80146a2860822625a019ad822860822625a028062849e5c412440e0dd7c138c34975c2c060111200d73b51343e803e903e90350c01f4cffe803e900c145468549271c17cb8b049f0bffcb8b08160824c4b402805af3cb8b0e0841ef765f7b232c7c572cfd400fe8088b3c58073c5b25c60063232c14933c59c3e80b2dab33260103ec01004f214013e809633c58073c5b3327b552000705279a018a182107362d09cc8cb1f5230cb3f58fa025007cf165007cf16c9718010c8cb0524cf165006fa0215cb6a14ccc971fb0010241023007cc30023c200b08e218210d53276db708010c8cb055008cf165004fa0216cb6a12cb1f12cb3fc972fb0093356c21e203c85004fa0258cf1601cf16ccc9ed54
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 6083770387798738000
amount: "10000000000"
from: 0:abbad8dc662fd3e6ddc8d0e5cdcac3c93464f2881459c1bb883133c40839a2a1
response_address: 0:abbad8dc662fd3e6ddc8d0e5cdcac3c93464f2881459c1bb883133c40839a2a1
forward_ton_amount: "1"
How this data was fetched?
Use tonapi.io