/
Confirmed transaction
07.01.2025, 11:13:07
Duration: 48s
Action
Route
Payload
Value
Swap tokens
-
0.512894708 TON
1.029 TELEMON
Contract deploy
Interfaces: [jetton_wallet_v1]
-
Internal message
Value:
0.512894708 TON
IHR disabled:
true
Created at:
07.01.2025, 11:13:07
Created lt:
52668056000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000481871 TON
Init:
-
OpCode:
Dedust Swap · 0xea06185d
Copy Raw body
query_id: 10405998728457374000
amount: "362894708"
step:
  pool_addr: 0:7ef04a0845644f82f79c81fec08c1a04aa1369ea5408d94f9bb5bd99a6a3f2eb
  params:
    kind_out: false
    limit: "977879491"
    next: null
swap_params:
  deadline: 1736249275
  recipient_addr: ""
  referral_addr: ""
  fulfill_payload: b5ee9c720101010100060000082e1cfa82
  reject_payload: b5ee9c720101010100060000082e1cfa82
Interfaces:
dedust_vault
Transaction
Tx hash:
75047767…b169bbb9
Prev. tx hash:
Total fee:
0.002505464 TON
Fwd. fee:
0.0008744 TON
Gas fee:
0.002214 TON
Storage fee:
0.000000002 TON
Action fee:
0.000291462 TON
End balance:
5,411,011.023920145 TON
Time:
07.01.2025, 11:13:14
Lt:
52668059000001
Prev. tx lt:
52668058000001
Status:
active → active
State hash:
8d…9a
e8…6b
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
163
Gas used:
5535
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.147079598 TON
IHR disabled:
true
Created at:
07.01.2025, 11:13:14
Created lt:
52668059000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000582938 TON
Init:
-
OpCode:
Dedust Swap External · 0x61ee542d
Copy Raw body
query_id: 10405998728457374000
proof: b5ee9c72010101010025000045800be0ac9f6bec08f07b6ae0639c39ecd1511a9a9adb4dbc9b6445697241adfb000021
amount: "362894708"
sender_addr: 0:29fca6d2aea6ec0e2c533b707ab64404257ee4b16a21b4169fb8ce5f745a46e8
current:
  kind_out: false
  limit: "977879491"
  next: null
swap_params:
  deadline: 1736249275
  recipient_addr: ""
  referral_addr: ""
  fulfill_payload: b5ee9c720101010100060000082e1cfa82
  reject_payload: b5ee9c720101010100060000082e1cfa82
How this data was fetched?
Use tonapi.io