/
SUSPICIOUS transaction
16.06.2024, 17:51:12
Duration: 43s
Action
Route
Payload
Value
Transfer token
SUSPICIOUS
Claim 500,000 NOT at https://wnot.app - Official Website. Please visit the website to claim your NOT rewards at your earliest convenience.
Contract deploy
SUSPICIOUS
Interfaces: [jetton_wallet_v2]
-
Internal message
Value:
0.1 TON
IHR disabled:
true
Created at:
16.06.2024, 17:51:12
Created lt:
47134598000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000833074 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "1000000"
destination: 0:106f4dba4b5c272fce70f5d976766e32e1f4ba529483ba90629c91f8b72fa42b
response_destination: 0:683ab61b3797b8d41012345d8f6aa8619f903c6560a9301945b43e14330ba343
custom_payload: null
forward_ton_amount: "1"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: "Claim 500,000 NOT at\r

        https://wnot.app - Official Website.\r

        Please visit the website to claim your NOT rewards at your earliest
        convenience."
Interfaces:
jetton_wallet_v2
Transaction
Tx hash:
c6012685…948ad4f1
Prev. tx hash:
Total fee:
0.00417133 TON
Fwd. fee:
0.0016936 TON
Gas fee:
0.0036068 TON
Storage fee:
0.000000006 TON
Action fee:
0.000564524 TON
End balance:
0.00609054 TON
Time:
16.06.2024, 17:51:27
Lt:
47134601000001
Prev. tx lt:
47134561000001
Status:
active → active
State hash:
9f…e8
19…cf
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
216
Gas used:
9017
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0946996 TON
IHR disabled:
true
Created at:
16.06.2024, 17:51:27
Created lt:
47134601000002
Bounced:
false
Bounce:
true
Forward Fee:
0.001129076 TON
Init:
b5ee9c7201010301006e000201340102084202ba2918c8947e9b25af9ac1b883357754173e5812f807a3d6e642a1470959539500870080020de9b7496b84e5f9ce1ebb2ececdc65c3e974a529077520c53923f16e5f4857000be55850f1185da55e6ebbcb8cb30b5ef060a0fd03482ec0f90cb3580eb0cfff2
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "1000000"
from: 0:683ab61b3797b8d41012345d8f6aa8619f903c6560a9301945b43e14330ba343
response_address: 0:683ab61b3797b8d41012345d8f6aa8619f903c6560a9301945b43e14330ba343
forward_ton_amount: "1"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io