Transaction 9ee9ca0e9682837735e36ccdf6bf0ee80e0529455c4d465d9f50bb70cd439409

1 Input
  • 7d25f4e324462cd548e6cd9ed2cc73eb5a99839e59443bfaab3655786bbfe038:0
    OP_DATA_32(32) 9f3f664e412a8273f0da89ca4dc4a5f940ac4096de5790cd6449be017f3e3bcd
    OP_CHECKSIG(172)
    OP_0(0)
    OP_IF(99)
    OP_DATA_3(3) ord
    OP_DATA_1(1) 
    OP_DATA_24(24) text/plain;charset=utf-8
    OP_0(0)
    OP_PUSHDATA2(77) {"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How do Light Clients in Blockchain Ensure Data Security?","a":"Consensus Algorithm: Light Clients utilize consensus algorithms to ensure the security and validity of the blockchain. The most common consensus algorithm is the Proof of Work (PoW) algorithm, which requires miners to solve complex mathematical problems to mine new blocks and validate transactions. Light Clients rely on the consensus algorithm"}]}],"pr":"d6ec5f8894d
    OP_DATA_55(55) eac74928cba6abeed0171a96ece32b91198003f4513136453e04f"}
    OP_ENDIF(104)
1 Outputs
  • 9ee9ca0e9682837735e36ccdf6bf0ee80e0529455c4d465d9f50bb70cd439409:0
  • value  546
    address  bc1pffh9rqw5mryqjnenm6teamztwf2qrnyymt0447qf4ywmlxze5duqgmmcnz