/
SUSPICIOUS transaction
01.08.2024, 16:08:42
Duration: 48s
Action
Route
Payload
Value
Send NFT
SUSPICIOUS
Verify claim: 500,000 $NOT + 3,000 USD₮
Transfer TON
SUSPICIOUS
-
0.244421853 TON
Internal message
Value:
0.1 TON
IHR disabled:
true
Created at:
01.08.2024, 16:08:42
Created lt:
48161603000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000505604 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "10042029"
destination: 0:5ae1b6f0899be9048b9019693a30a095acd78fa080d0cb76bc708a20d2e56de9
response_destination: 0:f492cb358b3d8a2baa2e093b89dd6b091765df0fadf728419b17284ad33fa7f6
custom_payload: null
forward_ton_amount: "0"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: ""
Interfaces:
jetton_wallet_governed
Transaction
Tx hash:
2bddec30…3293af4b
Prev. tx hash:
Total fee:
0.000800797 TON
Fwd. fee:
0.0012024 TON
Gas fee:
0.0004 TON
Storage fee:
0.000000004 TON
Action fee:
0.000400793 TON
End balance:
0.006094409 TON
Time:
01.08.2024, 16:08:49
Lt:
48161604000001
Prev. tx lt:
48161583000001
Status:
active → active
State hash:
df…49
69…a6
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
0
Gas used:
1000
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0983976 TON
IHR disabled:
true
Created at:
01.08.2024, 16:08:49
Created lt:
48161604000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000801607 TON
Init:
b5ee9c7201010301006e0002013401020842028f452d7a4dfd74066b682365177259ed05734435be76b5fd4bd5d8af2b7c3d68008700800b5c36de11337d209172032d27461412b59af1f4101a196ed78e11441a5cadbd3002c44ea652d4092859c67da44e4ca3add6565b0e2897d640a2c51bfb370d8877fa
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "10042029"
from: 0:e24dc92dc5af90592e776144ab117d266ec3902e0a4d2007404c6e7414c96764
response_address: 0:f492cb358b3d8a2baa2e093b89dd6b091765df0fadf728419b17284ad33fa7f6
forward_ton_amount: "0"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io