Transaction

Hash
b98984f049da3e6640fe2e7c1fbf5d7bd1c6b7bdc5c1e029194fe3e7d68b42cd
Block
644180 · 2020-07-16 00:09 · 197,665 confirmations
Data
memo-like
Size
271 bytes
Fee
272 sats (1.00369 sat/B)

1372d · twitter
When Russia attacked Ukraine with the Petya malware in 2017, it masqueraded as ransomware.

Dollars to donuts, this Twitter hack was also about something other than stealing a few Bitcoin.

Inputs (1)

Index
0
Previous Output
3044022029c77c06f5ebaf278cedcd68d6b2142808ba06e83548dd96bd2096ede516b960022021091e527dc9bf9371eb0262d0a3a3abfd5565e5220bf274a57a959338c6837e41 0265829fe6e9b7c5ea75c0650a202fdf082ec0f544265c066dea74c9c9590e205d

Outputs (3)

Index
0
Type
OP_RETURN
OP_RETURN 6d04 2f4cbd89b1623ed17f60702b2909bdec58e99fbc0bc4299cd8ee7ce5a7d134e6
Index
1
OP_DUP OP_HASH160 5c7a23e14a81666beccd146b073672a40785b8e1 OP_EQUALVERIFY OP_CHECKSIG
Index
2
OP_DUP OP_HASH160 b82bc457c36d35823619de18bbd01a1fc0fa8a40 OP_EQUALVERIFY OP_CHECKSIG

Raw

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