Transaction

Hash
015af5eaa27c57753585749a7bc68385bbbcd6a68e39e4b3a53f4382ec98b318
Block
602231 · 2019-09-27 23:58 · 236,908 confirmations
Data
memo-like
Size
271 bytes
Fee
278 sats (1.02583027 sat/B)

1644d
Lightning Network Vulnerability Full Disclosure: CVE-2019-12998 / CVE-2019-12999 / CVE-2019-13000
https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html

Inputs (1)

Index
0
Previous Output
304402205de1252e7740fae7a081b0d87d0eabe88f6057b035a7fb4aa9137181e6a0d52702201ebe53cb5a39b003faeef869cdf1f2770a341af360435a7b3ddafffaf6805c7741 03cf123401872079a963c34271cfc16a4e87a775a16165a26c0fe7d0ea71d48edf

Outputs (3)

Index
0
Type
OP_RETURN
OP_RETURN 6d04 ba0f2f9d8ec8eabb392c142b69fd6427d4f241a080b7fa5c475676ea210b7570
OP_DUP OP_HASH160 2559643c87992cc12fba4643ca152285c7d7c6b5 OP_EQUALVERIFY OP_CHECKSIG
Index
2
OP_DUP OP_HASH160 ba17230f39cd22dd270e203143243cbd06600481 OP_EQUALVERIFY OP_CHECKSIG

Raw

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