Transaction

74a792738c9f367a51b6ab54fedabed746cc64f58940dca2fd774d090a2147c3

StatusConfirmed
Timestamp2021-06-08 13:28:34 UTC
Block 6868010000000000000000000bfd374c7cc803d7ce9b52effcb84b57a3a1ca71a259e8
Fee0.00002738
Fee rate (BTC/KvB)0.00014468

1 input

0
Previous script pubkey (p2sh)

OP_HASH160 OP_PUSHBYTES_20 7ce0d1830042b4147df9bbc9e86d6959e78adc2c OP_EQUAL

Sequence

0xfffffffd

Script sig

OP_PUSHBYTES_22 0014be3f1707e38c39b44af7e5432ba0a249a236ecdb

Witness

304402207271d2777818371bf3ef05c543dd35d03f2bb0c9c1d99223b71007d6acef2ae00220033766bd85efe8d1e5ff2929fb2669dd33cd112db5ed4bddb35c0c94887ada1001 03977896ed3cfffe5b85d3075404d071b99e96a1d7e7f97c0ddacc76d21249766f

0.00002738

1 output

0
Script pubkey (op return)

OP_RETURN OP_PUSHDATA1 455720e6b996e58c97e9ab98e88083e88083e7949fe590b4e69f90e69f90e59ca837e697a5e4b88be58d88e695b0e5ada6e88083e8af95e697b6e4bdbfe794a8e5b08fe78cbfe6909ce9a298

Op return in utf8

EW 湖北高考考生吴某某在7日下午数学考试时使用小猿搜题

0.00000000

Details

Size271.0 B
Virtual size190.0 B
Version2
Lock time686799

Hex

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