/
Confirmed transaction
04.07.2024, 13:26:10
Duration: 1min: 12s
Action
Route
Payload
Value
Internal message
Value:
0.184908647 TON
IHR disabled:
true
Created at:
04.07.2024, 13:26:37
Created lt:
47527196000009
Bounced:
false
Bounce:
false
Forward Fee:
0.000441604 TON
Init:
-
OpCode:
Jetton Notify · 0x7362d09c
Copy Raw body
query_id: 16980761504507587000
amount: "2171744456806261"
sender: 0:632d9bb7cac2d984cf1b0950114acf58769c30df8c8f8da7bec16d2c8481319a
forward_payload:
  is_right: true
  value:
    sum_type: Cell
    op_code: 200
    value: b5ee9c72010101010006000008000000c8
Interfaces:
-
Transaction
Tx hash:
dfb71042…c03b350c
Prev. tx hash:
Total fee:
0.007636165 TON
Fwd. fee:
0.000964 TON
Gas fee:
0.0073148 TON
Storage fee:
0.000000037 TON
Action fee:
0.000321328 TON
End balance:
200.670260479 TON
Time:
04.07.2024, 13:26:49
Lt:
47527199000001
Prev. tx lt:
47527192000001
Status:
active → active
State hash:
c1…02
3a…e5
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
401
Gas used:
18287
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.25 TON
IHR disabled:
true
Created at:
04.07.2024, 13:26:49
Created lt:
47527199000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000642672 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 16980761504507587000
amount: "2171744456806261"
destination: 0:632d9bb7cac2d984cf1b0950114acf58769c30df8c8f8da7bec16d2c8481319a
response_destination: ""
custom_payload: null
forward_ton_amount: "200000000"
forward_payload:
  is_right: true
  value:
    sum_type: DedustSwap
    op_code: 3818968194
    value:
      step:
        pool_addr: 0:35d9d847afa261845de57a2d5696a3436692481b67ccc6e9cd0e2c17129fc386
        params:
          kind_out: false
          limit: "20000000000"
          next: null
      swap_params:
        deadline: 0
        recipient_addr: ""
        referral_addr: ""
        fulfill_payload: b5ee9c72010101010006000008000000c8
        reject_payload: b5ee9c72010101010006000008000001f4
How this data was fetched?
Use tonapi.io