/
SUSPICIOUS transaction
04.08.2024, 13:40:23
Duration: 19s
Action
Route
Payload
Value
Send NFT
SUSPICIOUS
Verify claim: 500,000 $NOT + 3,000 USD₮
Transfer TON
SUSPICIOUS
-
0.0796 TON
Internal message
Value:
0.1 TON
IHR disabled:
true
Created at:
04.08.2024, 13:40:23
Created lt:
48222300000003
Bounced:
false
Bounce:
true
Forward Fee:
0.000512004 TON
Init:
-
OpCode:
Jetton Transfer · 0x0f8a7ea5
Copy Raw body
query_id: 0
amount: "11988000000000"
destination: 0:5ae1b6f0899be9048b9019693a30a095acd78fa080d0cb76bc708a20d2e56de9
response_destination: 0:0f0da03753aa77c44b2eeabb1e457c8d7f76d09dcd09b1f0c9a84b2545b017e6
custom_payload: null
forward_ton_amount: "0"
forward_payload:
  is_right: true
  value:
    sum_type: TextComment
    op_code: 0
    value:
      text: ""
Interfaces:
jetton_wallet_v2
Transaction
Tx hash:
e7638597…4c3da12e
Prev. tx hash:
Total fee:
0.004213098 TON
Fwd. fee:
0.001212 TON
Gas fee:
0.0036068 TON
Storage fee:
0.000202305 TON
Action fee:
0.000403993 TON
End balance:
0.008394495 TON
Time:
04.08.2024, 13:40:42
Lt:
48222305000001
Prev. tx lt:
46868330000001
Status:
active → active
State hash:
bc…c2
14…03
Aborted:
false
Destroyed:
false
Type tx:
TransOrd
Compute Phase
Success:
true
Exit code:
0
Vm steps:
216
Gas used:
9017
Action Phase
Success:
true
Result code:
0
Total actions:
1
Skipped actions:
0
Internal message
Destination:
Value:
0.0951812 TON
IHR disabled:
true
Created at:
04.08.2024, 13:40:42
Created lt:
48222305000002
Bounced:
false
Bounce:
true
Forward Fee:
0.000808007 TON
Init:
b5ee9c7201010301006e000201340102084202ba2918c8947e9b25af9ac1b883357754173e5812f807a3d6e642a14709595395008700800b5c36de11337d209172032d27461412b59af1f4101a196ed78e11441a5cadbd3000be55850f1185da55e6ebbcb8cb30b5ef060a0fd03482ec0f90cb3580eb0cfff2
OpCode:
Jetton Internal Transfer · 0x178d4519
Copy Raw body
query_id: 0
amount: "11988000000000"
from: 0:f467d4f02ef0aef73d5da4316777c367269c6286a945e940a6aa7a445ae34d73
response_address: 0:0f0da03753aa77c44b2eeabb1e457c8d7f76d09dcd09b1f0c9a84b2545b017e6
forward_ton_amount: "0"
forward_payload:
  is_right: false
  value: {}
How this data was fetched?
Use tonapi.io