/
SUSPICIOUS transaction
15.08.2024, 18:20:30
Duration: 46s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
Airdrop $HMSTR
Transfer TON
SUSPICIOUS
Airdrop $HMSTR
1.211 TON
Internal message
Value:
0.05 TON
IHR disabled:
true
Created at:
15.08.2024, 18:20:30
Created lt:
48468235000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000537605 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "100"
destination: 0:f94675249b4355325db4308a8c8660280287a0c04abec4aca309b1a65818c56a
response_destination: 0:834ae237985a8ac3500cfad2629571bb3b4883ba8b6642f40de9419124a4d4ef
custom_payload: null
forward_ton_amount: "100000"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: Airdrop $HMSTR
Interfaces:
jetton_wallet_governed
Transaction
Tx hash:
415b8928…66503245
Prev. tx hash:
Total fee:
0.000817011 TON
Fwd. fee:
0.0012504 TON
Gas fee:
0.0004 TON
Storage fee:
0.000000218 TON
Action fee:
0.000416793 TON
End balance:
0.006094195 TON
Time:
15.08.2024, 18:20:30
Lt:
48468235000003
Prev. tx lt:
48466893000001
Status:
active → active
State hash:
07…38
5b…12
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
0
Gas used:
1000
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0483496 TON
IHR disabled:
true
Created at:
15.08.2024, 18:20:30
Created lt:
48468235000004
Bounced:
false
Bounce:
true
Forward Fee:
0.000833607 TON
Init:
b5ee9c7201010301006e0002013401020842028f452d7a4dfd74066b682365177259ed05734435be76b5fd4bd5d8af2b7c3d68008700801f28cea493686aa64bb686115190cc050050f4180957d89594613634cb0318ad5002c44ea652d4092859c67da44e4ca3add6565b0e2897d640a2c51bfb370d8877fa
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "100"
from: 0:834ae237985a8ac3500cfad2629571bb3b4883ba8b6642f40de9419124a4d4ef
response_address: 0:834ae237985a8ac3500cfad2629571bb3b4883ba8b6642f40de9419124a4d4ef
forward_ton_amount: "100000"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io