/
Confirmed transaction
19.05.2024, 15:52:44
Duration: 49s
Action
Route
Payload
Value
Transfer token
Dik evil
Contract deploy
Interfaces: [jetton_wallet_v2]
-
Internal message
Value:
0.11 TON
IHR disabled:
true
Created at:
19.05.2024, 15:52:44
Created lt:
46606145000002
Bounced:
false
Bounce:
false
Forward Fee:
0.000510938 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "8530000000000"
destination: 0:4bef6b5477e4713cd0cb9b98827040f277883be5e7dc8178f681322fe83bc4e9
response_destination: 0:3333653514440edc907b95e461447144175246cdb36ee2292d26dff0fb11199e
custom_payload: null
forward_ton_amount: "10000000"
forward_payload:
  is_right: false
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: "Dik evil "
Interfaces:
jetton_wallet_v2
Transaction
Tx hash:
aedff483…d59f5770
Prev. tx hash:
Total fee:
0.003961676 TON
Fwd. fee:
0.0012104 TON
Gas fee:
0.003558 TON
Storage fee:
0.000000216 TON
Action fee:
0.00040346 TON
End balance:
0.008596182 TON
Time:
19.05.2024, 15:53:00
Lt:
46606150000001
Prev. tx lt:
46604781000001
Status:
active → active
State hash:
02…ef
82…dc
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
211
Gas used:
8895
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.1052316 TON
IHR disabled:
true
Created at:
19.05.2024, 15:53:00
Created lt:
46606150000002
Bounced:
false
Bounce:
true
Forward Fee:
0.00080694 TON
Init:
b5ee9c7201010301006e000201340102084202ba2918c8947e9b25af9ac1b883357754173e5812f807a3d6e642a1470959539500870080097ded6a8efc8e279a197373104e081e4ef1077cbcfb902f1ed02645fd07789d3000be55850f1185da55e6ebbcb8cb30b5ef060a0fd03482ec0f90cb3580eb0cfff2
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "8530000000000"
from: 0:3333653514440edc907b95e461447144175246cdb36ee2292d26dff0fb11199e
response_address: 0:3333653514440edc907b95e461447144175246cdb36ee2292d26dff0fb11199e
forward_ton_amount: "10000000"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io