/
SUSPICIOUS transaction
05.07.2024, 01:16:02
Duration: 24s
Action
Route
Payload
Value
Transfer token
@chan_les Scamer
Contract deploy
Interfaces: [jetton_wallet_v1]
-
Internal message
Value:
0.000000001 TON
IHR disabled:
true
Created at:
05.07.2024, 01:16:26
Created lt:
47538010000002
Bounced:
false
Bounce:
false
Forward Fee:
0.000469337 TON
Init:
-
OpCode:
Jetton Notify · 0x7362d09c
Copy Raw body
query_id: 6083770389854626000
amount: "1000000000"
sender: 0:2112e47faa581f732d4ee260ef938cd9acdeb61b7793036a2eb034f63c8be4c8
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: "@chan_les Scamer"
Interfaces:
wallet_v4r2
Transaction
Tx hash:
72e34648…b7acf5d4
Prev. tx hash:
Total fee:
0.000000157 TON
Fwd. fee:
0.000000000 TON
Gas fee:
0.000000000 TON
Storage fee:
0.000000157 TON
Action fee:
0.000000000 TON
End balance:
107.278966457 TON
Time:
05.07.2024, 01:16:26
Lt:
47538010000003
Prev. tx lt:
47537845000001
Status:
active → active
State hash:
73…94
04…02
Aborted:
true
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Skipped:
true
Skip Reason:
cskip_no_gas
How this data was fetched?
Use tonapi.io