"hash" : "c4f9a9e9eaca0fc5a04a41bc2eb8e1db8a1df62f8478a761647edae61282a523",
"confirmations" : 36,
"size" : 201,
"height" : 58311,
"version" : 1,
"merkleroot" : "614cd1b25ac981bdf7c44561029ff2fa93001c003ba1814dbb33bbd4eba3b0b5",
"tx" : [
"614cd1b25ac981bdf7c44561029ff2fa93001c003ba1814dbb33bbd4eba3b0b5"
],
"time" : 1371094705,
"nonce" : 3991148288,
"bits" : "1c061f09",
"difficulty" : 41.82101451,
"previousblockhash" : "07b82680ac722b7d56085a1325acb404fce1ea68222a9f33cece7af93092c095",
"nextblockhash" : "c03fce523cb424a7cd9bc55664f70095c72427ac724857c1f5e295f11ce9179c"
}
I think the chain rules are the same for the moment...
I do not know another client.
But this (version 2) seems to be a part of FUD strategy of one person/group that have ~300Mh/s.
Why?,...,we will see it.