/
SUSPICIOUS transaction
21.05.2024, 09:47:33
Duration: 1min: 38s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
ABU NOT COIN
Internal message
Value:
0.06358159 TON
IHR disabled:
true
Created at:
21.05.2024, 09:47:33
Created lt:
46639218000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000537605 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 6083770387806399000
amount: "1000000000"
destination: 0:0db0a18a1919c644cb6a11fdb4ca79b47259565b1c61126b11562c380eb72868
response_destination: 0:87e578a0dbee63b1798840e58dbc910c5458fd9d7e1b8a8670cfef3a6493cbfc
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: "ABU NOT COIN "
Interfaces:
jetton_wallet_v2
Transaction
Tx hash:
33e7340e…a0eed114
Prev. tx hash:
Total fee:
0.004024304 TON
Fwd. fee:
0.0012504 TON
Gas fee:
0.0036068 TON
Storage fee:
0.000000711 TON
Action fee:
0.000416793 TON
End balance:
0.006093702 TON
Time:
21.05.2024, 09:48:04
Lt:
46639224000001
Prev. tx lt:
46635246000001
Status:
active → active
State hash:
c4…60
5c…a3
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
216
Gas used:
9017
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.05872439 TON
IHR disabled:
true
Created at:
21.05.2024, 09:48:04
Created lt:
46639224000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000833607 TON
Init:
b5ee9c7201010301006e000201340102084202ba2918c8947e9b25af9ac1b883357754173e5812f807a3d6e642a147095953950087008001b61431432338c8996d423fb6994f368e4b2acb638c224d622ac58701d6e50d1000be55850f1185da55e6ebbcb8cb30b5ef060a0fd03482ec0f90cb3580eb0cfff2
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 6083770387806399000
amount: "1000000000"
from: 0:87e578a0dbee63b1798840e58dbc910c5458fd9d7e1b8a8670cfef3a6493cbfc
response_address: 0:87e578a0dbee63b1798840e58dbc910c5458fd9d7e1b8a8670cfef3a6493cbfc
forward_ton_amount: "1"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io