Event JSON
{
"id": "30f02b9ceb23441f798b44d5ff4827fc0eeef55e68244cc9de7ea2009ee4cac2",
"pubkey": "dee97518077808091745015441953ad814c22d4eaeaba6996385a3d7dc3d191e",
"created_at": 1722406026,
"kind": 1,
"tags": [
[
"e",
"b25ccc54685e684f03f4c97de115396227f7d7bd28b2427abdd19b82227de170",
"",
"root"
],
[
"e",
"3e5503830c6341c2957585c29c84d5545fee4eff408ebf4622b7e11c1812e31a",
"",
"reply"
],
[
"p",
"04c915daefee38317fa734444acee390a8269fe5810b2241e5e6dd343dfbecc9"
],
[
"p",
"a7f72cd8c8c7cf18fa6f44c131e01d5b88c2f47723a56626ef33d6990e6a9f15"
],
[
"r",
"https://mempool.space/address/bc1qlap8hkt9genaljz5nt2zlehhudx63zlahr2zek"
]
],
"content": "Within a span of 4.5 hours, bc1Zek engaged in several transactions (some transactions were dust attacks), potentially revealing ties to other addresses/transactions/services associated with bc1Zek\n\nhttps://mempool.space/address/bc1qlap8hkt9genaljz5nt2zlehhudx63zlahr2zek",
"sig": "3c2141afd4f89d046414f3ae61f49f12cdc9ea0595d602465087062ccae255ce5770253524eaf4b0ebf7722d9a30c6395cea9bf0f617c8fc96da75ef8cb3cd1c"
}