Transaction

Hash
f9a905f8c687fa0cba7bf2f74e5d8d40e5ada9be34fa40cb2e2ace822834029a
Block
602231 · 2019-09-27 23:58 · 239,316 confirmations
Data
memo-like
Size
272 bytes
Fee
278 sats (1.02205884 sat/B)

1663d
Lightning Network Vulnerability Full Disclosure: CVE-2019-12998 / CVE-2019-12999 / CVE-2019-13000
https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html

Inputs (1)

Index
0
Previous Output
3045022100ea673bab6ff61a18c02637205c5fdbbaf98749840000fd9aa1957fb02b9997f102205581ba09d308a7d5c0280a9cadfd751f3507ea14ca32d38156b0c2091e53b0bb41 02e2053838670dc0383d945319d3d1a285476696a4388ed0d907ae043b64af9813

Outputs (3)

Index
0
Type
OP_RETURN
OP_RETURN 6d04 ba0f2f9d8ec8eabb392c142b69fd6427d4f241a080b7fa5c475676ea210b7570
OP_DUP OP_HASH160 2559643c87992cc12fba4643ca152285c7d7c6b5 OP_EQUALVERIFY OP_CHECKSIG
Index
2
OP_DUP OP_HASH160 cba6a1b91eda58e77ff5f265037326699625dfa0 OP_EQUALVERIFY OP_CHECKSIG

Raw

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