Transaction

Hash
ebe9114e413a7e65b64c5021136d83e13b90f515da333372c1f95f53179bb857
Block
644175 · 2020-07-15 23:35 · 197,629 confirmations
Data
memo-like
Size
272 bytes
Fee
272 sats (1 sat/B)

1372d · twitter
When Russia attacked Ukraine with the Petya malware in 2017, it masqueraded as ransomware.

Dollars to donuts, this Twitter hack was also about something other than stealing a few Bitcoin.

Inputs (1)

Index
0
Previous Output
3045022100bdeb9cc1ce73e00ffcee913596ab5affe2122c936f41ed659f7349b4028ea08702205b9eca826e26b95826a8dcf5d01bf2d0ccdf6efcd5b5429ee252ab91478097d741 033776a75caa202b999c3eee188a0dee0d5d10c588833b6970ff34494ab1ddc87e

Outputs (3)

Index
0
Type
OP_RETURN
OP_RETURN 6d04 2f4cbd89b1623ed17f60702b2909bdec58e99fbc0bc4299cd8ee7ce5a7d134e6
Index
1
OP_DUP OP_HASH160 5c7a23e14a81666beccd146b073672a40785b8e1 OP_EQUALVERIFY OP_CHECKSIG
Index
2
OP_DUP OP_HASH160 587ebcad1c94a2e0ae67d9dc9e538618d956c4e3 OP_EQUALVERIFY OP_CHECKSIG

Raw

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