/
SUSPICIOUS transaction
28.06.2024, 16:11:27
Duration: 30s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
Wake up, happy owner of the utilitarian NFT Runeston! I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! Just go to the project channel and learn everything about Runes
Contract deploy
SUSPICIOUS
Interfaces: [jetton_wallet_v1]
-
Internal message
Value:
0.1 TON
IHR disabled:
true
Created at:
28.06.2024, 16:11:27
Created lt:
47394356000002
Bounced:
false
Bounce:
true
Forward Fee:
0.001072009 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 6412246846011949000
amount: "10000000000"
destination: 0:c9de4bf145394a4c56d02cb7da9361f24e236f7a2fa8d5c19507ba673cd0ec71
response_destination: 0:a096a28e5b810ef0db16f68e676828cc47f3d5545db513de115d6e58571fc8c6
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: >-
        Wake up, happy owner of the utilitarian NFT Runeston!
         I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! 
        Just go to the project channel and learn everything about Runes
Interfaces:
jetton_wallet_v1
Transaction
Tx hash:
2a5f2731…87724add
Prev. tx hash:
Total fee:
0.005140051 TON
Fwd. fee:
0.0049724 TON
Gas fee:
0.0034824 TON
Storage fee:
0.00000021 TON
Action fee:
0.001657441 TON
End balance:
0.041153708 TON
Time:
28.06.2024, 16:11:27
Lt:
47394356000003
Prev. tx lt:
47394146000003
Status:
active → active
State hash:
09…18
ac…bc
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
175
Gas used:
8706
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0915452 TON
IHR disabled:
true
Created at:
28.06.2024, 16:11:27
Created lt:
47394356000004
Bounced:
false
Bounce:
true
Forward Fee:
0.003314959 TON
Init:
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
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 6412246846011949000
amount: "10000000000"
from: 0:a096a28e5b810ef0db16f68e676828cc47f3d5545db513de115d6e58571fc8c6
response_address: 0:a096a28e5b810ef0db16f68e676828cc47f3d5545db513de115d6e58571fc8c6
forward_ton_amount: "1"
How this data was fetched?
Use tonapi.io