/
Confirmed transaction
03.09.2024, 20:49:26
Duration: 38s
Action
Route
Payload
Value
Transfer TON
-
0.2079484 TON
Transfer token
Call: TonkeeperRelayerFee
Transfer token
HACKED BY BLACK BEAR TEAM IN BANGLADESH. ⠀⠀⢀⣤⣶⣶⣤⣄⡀ ⠀⢀⣿⣿⣿⣿⣿⣿⣿⡆ ⠀⠸⣿⣿⣿⣿⣿⡟⡟⡗ ⣿⠉⣿⠉⣿⡏⠹⡏⢹⡏⢹⣿⣿⠉⣿⠉⣿⡟⢋⠛⣿⠉⡟⢉⡏⠹⠏⣹⣿ ⠀⠀⠙⠏⠯⠛⣉⢲⣧⠟ ⣿⠄⣿⠄⣿⡇⡄⠁⢸⡇⢸⣿⣿⠄⣿⠄⣿⠄⣿⣿⣿⠄⡀⢻⣿⡄⢠⣿⣿ ⠀⠀⠠⢭⣝⣾⠿⣴⣿⠇ ⣿⣦⣤⣴⣿⣧⣿⣤⣼⣧⣬⣭⣿⣦⣤⣴⣿⣧⣤⣤⣿⣤⣷⣤⣿⣧⣼⣿⣿ ⠀⠀⢐⣺⡿⠁⠀⠈⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⣶⣶⣶⣶⣶⣶⠀ ⠀⠀⣚⣿⠃ ⣶⣶⣶⣶ ⢀⣿⣿⣿⣷⢒⣢⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣠⣶⣶⣄⠄ ⢰⣿⣿⡿⣿⣦⠬⢝⡄⠀⠀⠀⠀⠀⠀⢠⣿⠿⠿⠟⠛⠋⠁ ⠠⢿⣿⣷⠺⣿⣗⠒⠜⡄⠀⠀⠀⠀⣴⠟⠁ ⠀⣰⣿⣷⣍⡛⣯⣯⣙⡁⠀⠀⣠⡾⠁ ⠀⠨⢽⣿⣷⢍⣛⣶⢷⣼⣠⣾⠋ ⠀⠀⠘⢿⣿⣖⠬⣹⣶⣿⠟⠁ ⠀⠀⠀⠚⠿⠿⡒⠨⠛⠋ ⠀⠀⠀⠐⢒⣛⣷ ⠀⠀⠀⢘⣻⣭⣭ ⠀⠀⠀⡰⢚⣺⣿ ⠀⠀⢠⣿⣿⣿⣿⣦⡄ ⠀⠀⢸⡿⢿⣿⢿⡿⠃ ⠀⠀⠘⡇⣸⣿⣿⣿⣆ ⠀⠀⠀⠀⠸⣿⡿⠉⠁ ⠀⠀⠀⠀⠀⢿⡟
Contract deploy
Interfaces: [wallet_v5r1]
-
Internal message
Value:
0.0912868 TON
IHR disabled:
true
Created at:
03.09.2024, 20:49:38
Created lt:
48915358000004
Bounced:
false
Bounce:
true
Forward Fee:
0.003404293 TON
Init:
b5ee9c7201010301006e000201340102084202ba2918c8947e9b25af9ac1b883357754173e5812f807a3d6e642a14709595395008700801bdc3c96b7875363deec8100f583653b29ba80f334af8441c92271a07d9816e8b002bf1272e1e1bc8721c116c67b79e3f1ad1b14412144fe3a69b51018066706fc32
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 6083770390001565000
amount: "11167941679226"
from: 0:64eff37b92916df176b582c3b5f407950c242fc7dcb47204a48a17109233c6ce
response_address: 0:dfbd5be8497fdc0c9fcbdfc676864840ddf8ad6423d6d5657d9b0e8270d6c8ac
forward_ton_amount: "1"
forward_payload:
  is_right: false
  value: {}
Interfaces:
jetton_wallet_v2
Transaction
Tx hash:
db527d5c…e51216a8
Prev. tx hash:
Total fee:
0.005739484 TON
Fwd. fee:
0.0049504 TON
Gas fee:
0.0040892 TON
Storage fee:
0.000000177 TON
Action fee:
0.001650107 TON
End balance:
0.006094413 TON
Time:
03.09.2024, 20:49:38
Lt:
48915358000005
Prev. tx lt:
48914117000005
Status:
active → active
State hash:
ea…3a
9c…51
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
191
Gas used:
10223
Action Phase
Success:
true
Result code:
0
Total actions:
3
Skipped actions:
0
Internal message
Destination:
Value:
0.000000001 TON
IHR disabled:
true
Created at:
03.09.2024, 20:49:38
Created lt:
48915358000006
Bounced:
false
Bounce:
false
Forward Fee:
0.003033624 TON
Init:
-
OpCode:
Jetton Notify · 0x7362d09c
Copy Raw body
query_id: 6083770390001565000
amount: "11167941679226"
sender: 0:64eff37b92916df176b582c3b5f407950c242fc7dcb47204a48a17109233c6ce
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: |-
        HACKED BY BLACK BEAR TEAM IN BANGLADESH.    

        ⠀⠀⢀⣤⣶⣶⣤⣄⡀
        ⠀⢀⣿⣿⣿⣿⣿⣿⣿⡆
        ⠀⠸⣿⣿⣿⣿⣿⡟⡟⡗ ⣿⠉⣿⠉⣿⡏⠹⡏⢹⡏⢹⣿⣿⠉⣿⠉⣿⡟⢋⠛⣿⠉⡟⢉⡏⠹⠏⣹⣿
        ⠀⠀⠙⠏⠯⠛⣉⢲⣧⠟ ⣿⠄⣿⠄⣿⡇⡄⠁⢸⡇⢸⣿⣿⠄⣿⠄⣿⠄⣿⣿⣿⠄⡀⢻⣿⡄⢠⣿⣿
        ⠀⠀⠠⢭⣝⣾⠿⣴⣿⠇ ⣿⣦⣤⣴⣿⣧⣿⣤⣼⣧⣬⣭⣿⣦⣤⣴⣿⣧⣤⣤⣿⣤⣷⣤⣿⣧⣼⣿⣿
        ⠀⠀⢐⣺⡿⠁⠀⠈⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⣶⣶⣶⣶⣶⣶⠀
        ⠀⠀⣚⣿⠃ ⣶⣶⣶⣶
        ⢀⣿⣿⣿⣷⢒⣢⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣠⣶⣶⣄⠄
        ⢰⣿⣿⡿⣿⣦⠬⢝⡄⠀⠀⠀⠀⠀⠀⢠⣿⠿⠿⠟⠛⠋⠁
        ⠠⢿⣿⣷⠺⣿⣗⠒⠜⡄⠀⠀⠀⠀⣴⠟⠁
        ⠀⣰⣿⣷⣍⡛⣯⣯⣙⡁⠀⠀⣠⡾⠁
        ⠀⠨⢽⣿⣷⢍⣛⣶⢷⣼⣠⣾⠋
        ⠀⠀⠘⢿⣿⣖⠬⣹⣶⣿⠟⠁
        ⠀⠀⠀⠚⠿⠿⡒⠨⠛⠋
        ⠀⠀⠀⠐⢒⣛⣷
        ⠀⠀⠀⢘⣻⣭⣭
        ⠀⠀⠀⡰⢚⣺⣿
        ⠀⠀⢠⣿⣿⣿⣿⣦⡄
        ⠀⠀⢸⡿⢿⣿⢿⡿⠃
        ⠀⠀⠘⡇⣸⣿⣿⣿⣆
        ⠀⠀⠀⠀⠸⣿⡿⠉⠁
        ⠀⠀⠀⠀⠀⢿⡟
Internal message
Destination:
Value:
0.082247022 TON
IHR disabled:
true
Created at:
03.09.2024, 20:49:38
Created lt:
48915358000007
Bounced:
false
Bounce:
false
Forward Fee:
0.000266669 TON
Init:
-
OpCode:
Excess · 0xd53276db
Copy Raw body
query_id: 6083770390001565000
How this data was fetched?
Use tonapi.io