Transaction

Hash
e9c02f4c4824f3a8dbd365271f56139b377ace2fa84c9b1c8a3bda612d21d489
Block
549078 · 2018-09-22 21:57 · 114,200 confirmations
Data
memo-reply
Size
414 bytes
Fee
421 sats (1.01690817 sat/B)

replied 798d
injection of a similar bug in the future by an actual malicious developer? Notice that Greg Maxwell, Wladimir J. van der Laan, Pieter Wuille and Cory Fields didn't spot it."

Inputs (1)

Index
0
Previous Output
3045022100f065463c2895bd715a499e55ac9a094c89af4e8dd9c6619b5956ee267eb8911e0220134c68e04651ed7f6b162e48be460be1dd8ad980270aafab3ae510c2971cd86741 03202a46f984dec888c48c67f9d36ad3cc635285300551bd3ff9d19438ec7f2ca2

Outputs (2)

Index
0
OP_DUP OP_HASH160 2559643c87992cc12fba4643ca152285c7d7c6b5 OP_EQUALVERIFY OP_CHECKSIG
Index
1
Type
OP_RETURN
OP_RETURN 6d03 b829b86a144789a3b1042d0b676d16bb63e17152867db97e609d102549051eb0 20696e6a656374696f6e206f6620612073696d696c61722062756720696e207468652066757475726520627920616e2061637475616c206d616c6963696f757320646576656c6f7065723f204e6f7469636520746861742047726567204d617877656c6c2c20576c6164696d6972204a2e2076616e20646572204c61616e2c20506965746572205775696c6c6520616e6420436f7279204669656c6473206469646e27742073706f742069742e22

Raw

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