/
SUSPICIOUS transaction
28.06.2024, 08:27:22
Duration: 34s
Action
Route
Payload
Value
Transfer token
"Wake up, happy owner of the utilitarian NFT Runeston! I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! Just go to the project channel and learn everything about Runeston!"
Internal message
Value:
0.079193456 TON
IHR disabled:
true
Created at:
28.06.2024, 08:27:22
Created lt:
47387323000002
Bounced:
false
Bounce:
true
Forward Fee:
0.001109342 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 6083770387339284000
amount: "10000000000"
destination: 0:800f7ab278a90801cd755c111786771559c1b9df9816d5ab3595e3f94b0dda9c
response_destination: 0:fd424e533c6b0ea96c1188f2731714b790de87f7d163ff1bb0880fb7521d0c4a
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: >-
        "Wake up, happy owner of the utilitarian NFT Runeston!

        I, just like you, received my NFT absolutely for free. You can easily
        check this and make sure that Runeston is an active project! 

        Just go to the project channel and learn everything about Runeston!"
Interfaces:
jetton_wallet_v1
Transaction
Tx hash:
c189192b…93d57b87
Prev. tx hash:
Total fee:
0.005164689 TON
Fwd. fee:
0.005028400 TON
Gas fee:
0.003482400 TON
Storage fee:
0.000006182 TON
Action fee:
0.001676107 TON
End balance:
0.028360152 TON
Time:
28.06.2024, 08:27:40
Lt:
47387327000001
Prev. tx lt:
47380881000005
Status:
active → active
State hash:
01…66
21…67
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
175
Gas used:
8706
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.070682656 TON
IHR disabled:
true
Created at:
28.06.2024, 08:27:40
Created lt:
47387327000002
Bounced:
false
Bounce:
true
Forward Fee:
0.003352293 TON
Init:
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
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 6083770387339284000
amount: "10000000000"
from: 0:fd424e533c6b0ea96c1188f2731714b790de87f7d163ff1bb0880fb7521d0c4a
response_address: 0:fd424e533c6b0ea96c1188f2731714b790de87f7d163ff1bb0880fb7521d0c4a
forward_ton_amount: "1"
How this data was fetched?
Use tonapi.io