/
Confirmed transaction
14.12.2024, 19:24:36
Duration: 51s
Action
Route
Payload
Value
Contract deploy
Interfaces: [jetton_wallet]
-
Contract deploy
Interfaces: [wallet_v4r2]
-
Internal message
Value:
1.61811 TON
IHR disabled:
true
Created at:
14.12.2024, 19:24:36
Created lt:
51862986000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000486138 TON
Init:
-
OpCode:
Dedust Swap · 0xea06185d
Copy Raw body
query_id: 1820316402480155400
amount: "1468110000"
step:
  pool_addr: 0:e5898916f91ca8d0210fa53873c5b1d3f7b362bbd04e1cbc2276ca1f0a3e90bf
  params:
    kind_out: false
    limit: "2016662078814"
    next: null
swap_params:
  deadline: 1734205158
  recipient_addr: ""
  referral_addr: ""
  fulfill_payload: b5ee9c720101010100060000082e1cfa82
  reject_payload: b5ee9c720101010100060000082e1cfa82
Interfaces:
dedust_vault
Transaction
Tx hash:
e65f6102…29446e0b
Prev. tx hash:
Total fee:
0.002507597 TON
Fwd. fee:
0.0008808 TON
Gas fee:
0.002214 TON
Storage fee:
0.000000002 TON
Action fee:
0.000293595 TON
End balance:
5,271,219.86021367 TON
Time:
14.12.2024, 19:24:47
Lt:
51862990000001
Prev. tx lt:
51862988000003
Status:
active → active
State hash:
9c…88
a8…17
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
163
Gas used:
5535
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.147073198 TON
IHR disabled:
true
Created at:
14.12.2024, 19:24:47
Created lt:
51862990000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000587205 TON
Init:
-
OpCode:
Dedust Swap External · 0x61ee542d
Copy Raw body
query_id: 1820316402480155400
proof: b5ee9c72010101010025000045800be0ac9f6bec08f07b6ae0639c39ecd1511a9a9adb4dbc9b6445697241adfb000021
amount: "1468110000"
sender_addr: 0:4f58cad1470762a5ea3c3ee3555b975b67c0230f00d05d63e37fc0b19965d9a5
current:
  kind_out: false
  limit: "2016662078814"
  next: null
swap_params:
  deadline: 1734205158
  recipient_addr: ""
  referral_addr: ""
  fulfill_payload: b5ee9c720101010100060000082e1cfa82
  reject_payload: b5ee9c720101010100060000082e1cfa82
How this data was fetched?
Use tonapi.io