/
SUSPICIOUS transaction
04.04.2024, 12:55:51
Duration: 7s
Action
Route
Payload
Value
Transfer token
TON Hacker House 2024 Airdrop
Contract deploy
Interfaces: [jetton_wallet]
-
Internal message
Value:
0.000000001 TON
IHR disabled:
true
Created at:
04.04.2024, 12:55:51
Created lt:
45668195000006
Bounced:
false
Bounce:
false
Forward Fee:
0.001264010 TON
Init:
-
OpCode:
Jetton Notify · 0x7362d09c
Copy Raw body
query_id: 6083770388945200000
amount: "100000000000000000"
sender: 0:9f6560fdba6823843c4e11e2de7a0d086ca0a98c78340cbdf301979c2575005c
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: TON Hacker House 2024 Airdrop
Account:
Interfaces:
wallet_v3r1
Transaction
Tx hash:
a116d8c2…bbed65f1
Prev. tx hash:
Total fee:
0.000000002 TON
Fwd. fee:
0.000000000 TON
Gas fee:
0.000000000 TON
Storage fee:
0.000000002 TON
Action fee:
0.000000000 TON
End balance:
0.000000000 TON
Time:
04.04.2024, 12:55:58
Lt:
45668196000001
Prev. tx lt:
45661473000005
Status:
uninit → nonexist
State hash:
58…36
90…a4
Aborted:
true
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Skipped:
true
Skip Reason:
cskip_no_gas
How this data was fetched?
Use tonapi.io