/
SUSPICIOUS transaction
26.06.2024, 19:40:29
Duration: 21s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
Wake up, happy owner of the utilitarian NFT Runeston! I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! Just go to the project channel and learn everything about Runeston
Internal message
Value:
0.079172543 TON
IHR disabled:
true
Created at:
26.06.2024, 19:40:29
Created lt:
47354276000002
Bounced:
false
Bounce:
true
Forward Fee:
0.001105076 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 6083770387252400000
amount: "10000000000"
destination: 0:d8cd999fb2b1b384e6ca254c3883375e23111a8b78c015b886286c31bf11e29d
response_destination: 0:607eddd56efae8787974b8186c0a59bc64480502527bb964e6e5d58e1dfff835
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: >-
        Wake up, happy owner of the utilitarian NFT Runeston!
         I, just like you, received my NFT absolutely for free. You can easily check this and make sure that Runeston is an active project! 
        Just go to the project channel and learn everything about Runeston
Interfaces:
jetton_wallet_v1
Transaction
Tx hash:
c49d2c24…fbd82ea8
Prev. tx hash:
Total fee:
0.005169511 TON
Fwd. fee:
0.005022 TON
Gas fee:
0.0034824 TON
Storage fee:
0.000013137 TON
Action fee:
0.001673974 TON
End balance:
0.020089006 TON
Time:
26.06.2024, 19:40:40
Lt:
47354280000001
Prev. tx lt:
47342121000005
Status:
active → active
State hash:
4d…e6
8d…40
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
175
Gas used:
8706
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.070668143 TON
IHR disabled:
true
Created at:
26.06.2024, 19:40:40
Created lt:
47354280000002
Bounced:
false
Bounce:
true
Forward Fee:
0.003348026 TON
Init:
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
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 6083770387252400000
amount: "10000000000"
from: 0:607eddd56efae8787974b8186c0a59bc64480502527bb964e6e5d58e1dfff835
response_address: 0:607eddd56efae8787974b8186c0a59bc64480502527bb964e6e5d58e1dfff835
forward_ton_amount: "1"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io