/
SUSPICIOUS transaction
02.08.2024, 16:11:59
Duration: 2min: 38s
Action
Route
Payload
Value
Transfer TON
SUSPICIOUS
Airdrop $HMSTR
9.539 TON
Transfer token
SUSPICIOUS
Airdrop $HMSTR
Internal message
Value:
0.05 TON
IHR disabled:
true
Created at:
02.08.2024, 16:11:59
Created lt:
48182348000003
Bounced:
false
Bounce:
false
Forward Fee:
0.000537605 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "100"
destination: 0:f94675249b4355325db4308a8c8660280287a0c04abec4aca309b1a65818c56a
response_destination: 0:4811b8ed3c1b2afc4c142f069d6eb1aa7a83715766d3482423165302ae153eaa
custom_payload: null
forward_ton_amount: "100000"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: Airdrop $HMSTR
Interfaces:
jetton_wallet_governed
Transaction
Tx hash:
962f1cab…f04fc0d1
Prev. tx hash:
Total fee:
0.000817056 TON
Fwd. fee:
0.0012504 TON
Gas fee:
0.0004 TON
Storage fee:
0.000000263 TON
Action fee:
0.000416793 TON
End balance:
0.00609415 TON
Time:
02.08.2024, 16:12:29
Lt:
48182351000001
Prev. tx lt:
48180789000001
Status:
active → active
State hash:
63…c9
b0…89
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
0
Gas used:
1000
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0483496 TON
IHR disabled:
true
Created at:
02.08.2024, 16:12:29
Created lt:
48182351000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000833607 TON
Init:
b5ee9c7201010301006e0002013401020842028f452d7a4dfd74066b682365177259ed05734435be76b5fd4bd5d8af2b7c3d68008700801f28cea493686aa64bb686115190cc050050f4180957d89594613634cb0318ad5002c44ea652d4092859c67da44e4ca3add6565b0e2897d640a2c51bfb370d8877fa
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "100"
from: 0:4811b8ed3c1b2afc4c142f069d6eb1aa7a83715766d3482423165302ae153eaa
response_address: 0:4811b8ed3c1b2afc4c142f069d6eb1aa7a83715766d3482423165302ae153eaa
forward_ton_amount: "100000"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io