Monero Transaction 04bfbd4a80f462ff1c5506da62ba337f9b300cac5e69e5567e69597d8e48024b

Autorefresh is OFF

Tx hash: 04bfbd4a80f462ff1c5506da62ba337f9b300cac5e69e5567e69597d8e48024b

Tx prefix hash: 065dee068d17d5192f4b6e149e348121d0658112dc04652f799f2bfc9df2fc9b
Tx public key: 49ec4210954d71ef039fb118e9e6c3c8f9f31a19fa94dfb33037b53a4b561755
Payment id: 3a53620173d512c43dc6b0baad770e70b69ebef19b8c2de78187b4c2a138a2d3

Transaction 04bfbd4a80f462ff1c5506da62ba337f9b300cac5e69e5567e69597d8e48024b was carried out on the Monero network on 2014-08-17 09:20:01. The transaction has 3116845 confirmations. Total output fee is 0.008424970000 XMR.

Timestamp: 1408267201 Timestamp [UTC]: 2014-08-17 09:20:01 Age [y:d:h:m:s]: 10:109:19:32:12
Block: 177079 Fee (per_kB): 0.008424970000 (0.008303339057) Tx size: 1.0146 kB
Tx version: 1 No of confirmations: 3116845 RingCT/type: no
Extra: 0221003a53620173d512c43dc6b0baad770e70b69ebef19b8c2de78187b4c2a138a2d30149ec4210954d71ef039fb118e9e6c3c8f9f31a19fa94dfb33037b53a4b561755

7 output(s) for total of 12.171575030000 xmr

stealth address amount amount idx tag
00: 1c7f72e7192b97ed9edd67411f9389d76f943f773abd01dfecec0936da60cb9a 0.001575030000 0 of 1 -
01: 0c84489b660f3396763a02937afa93cdbfd0582f56fad6707be8faaa079672f4 0.080000000000 93595 of 269576 -
02: 4bbf602bafda2f73fdec66a20d6c44e5b3c0de16a3cc48714c3a6afb8e7b031a 0.090000000000 106908 of 317822 -
03: e1e4f58ca784055b62629a55533dfe4c12154200ff95ff277431b57c741ae234 0.100000000000 438211 of 982315 -
04: 4a9a2aafb00bbdbec82803a652ca5b655300ef27d3011c6d6d5097244c98b572 0.900000000000 95062 of 454894 -
05: 3b8a723e1578f2ee0295b8f79136050b29ab5adcf80dcb85470be82f6a4925a0 5.000000000000 104721 of 255089 -
06: cb31b5169a7191d56c519ade380fe3aedc0e31c13309c12d792c4a5569097115 6.000000000000 76179 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-22 01:01:33 till 2014-08-17 07:09:31; resolution: 0.69 days)

  • |____________________________________________________________________________________________*____________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________*_____________________________________________________________________________________________________________*|
  • |____________________________________________________________________________________*____________________________________________________________________________________*|

4 inputs(s) for total of 12.180000000000 xmr

key image 00: d8e7bde69698413cf53941e1cf33e9b09c3bf6ec7f4525c085db9b22f103e29e amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6fb06712475588d6b10f9c67f54f822ec8484dfcbb4c78005eea14587f4c5c34 00099167 1 5/7 2014-06-24 06:12:25 10:163:22:39:48
- 01: a542ab0b62ba06b286744d2656791215e6aaa9c0274770684c47e06461034a44 00176695 0 0/6 2014-08-17 03:41:24 10:110:01:10:49
key image 01: 58ed725f8f68f61acb0bcd58b8f1034577e506aa7c30ce3c6415bfa4ff0ed210 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 11514f6e456092d397c324fc5f9a45d825340ce5ba1c6562645999af6eed848e 00005688 0 0/8 2014-04-22 02:01:33 10:227:02:50:40
- 01: 58b0172b463a5a2d0e2917371631a151ac2fcf8c285b6912d87928e54ceec4c8 00176807 2 14/73 2014-08-17 05:19:25 10:109:23:32:48
key image 02: 11afc1c605ffaaab064fe448ceaa15dc04683fbfabb5fc323931595f73fbde28 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 91aeacdf1c821107624748299098c217174f4b6d3d42f8d3764bf5899c0ef1f3 00066383 1 11/134 2014-06-01 15:57:22 10:186:12:54:51
- 01: b88445637cb7412da4bc32c466aff1b019a5865e58964a099e2da10eb86f6564 00176853 0 0/6 2014-08-17 06:09:31 10:109:22:42:42
key image 03: 116167e0b9d9c7627301b39aeb316e0d118a3917df126600b9a8778db60d999d amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68c8a05cc8da1e10f7347bd04a87f54e0d696888a2da1b94e3cf2c8e4e8d5538 00091248 1 6/41 2014-06-18 21:12:19 10:169:07:39:54
- 01: b57812d719e333ff5f8f93a3b6f0c2c52bee53a0edb9140dea564bb767204500 00176160 2 4/62 2014-08-16 18:19:34 10:110:10:32:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 13819, 30276 ], "k_image": "d8e7bde69698413cf53941e1cf33e9b09c3bf6ec7f4525c085db9b22f103e29e" } }, { "key": { "amount": 90000000000, "key_offsets": [ 315, 106321 ], "k_image": "58ed725f8f68f61acb0bcd58b8f1034577e506aa7c30ce3c6415bfa4ff0ed210" } }, { "key": { "amount": 90000000000, "key_offsets": [ 16094, 90587 ], "k_image": "11afc1c605ffaaab064fe448ceaa15dc04683fbfabb5fc323931595f73fbde28" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 5034, 9407 ], "k_image": "116167e0b9d9c7627301b39aeb316e0d118a3917df126600b9a8778db60d999d" } } ], "vout": [ { "amount": 1575030000, "target": { "key": "1c7f72e7192b97ed9edd67411f9389d76f943f773abd01dfecec0936da60cb9a" } }, { "amount": 80000000000, "target": { "key": "0c84489b660f3396763a02937afa93cdbfd0582f56fad6707be8faaa079672f4" } }, { "amount": 90000000000, "target": { "key": "4bbf602bafda2f73fdec66a20d6c44e5b3c0de16a3cc48714c3a6afb8e7b031a" } }, { "amount": 100000000000, "target": { "key": "e1e4f58ca784055b62629a55533dfe4c12154200ff95ff277431b57c741ae234" } }, { "amount": 900000000000, "target": { "key": "4a9a2aafb00bbdbec82803a652ca5b655300ef27d3011c6d6d5097244c98b572" } }, { "amount": 5000000000000, "target": { "key": "3b8a723e1578f2ee0295b8f79136050b29ab5adcf80dcb85470be82f6a4925a0" } }, { "amount": 6000000000000, "target": { "key": "cb31b5169a7191d56c519ade380fe3aedc0e31c13309c12d792c4a5569097115" } } ], "extra": [ 2, 33, 0, 58, 83, 98, 1, 115, 213, 18, 196, 61, 198, 176, 186, 173, 119, 14, 112, 182, 158, 190, 241, 155, 140, 45, 231, 129, 135, 180, 194, 161, 56, 162, 211, 1, 73, 236, 66, 16, 149, 77, 113, 239, 3, 159, 177, 24, 233, 230, 195, 200, 249, 243, 26, 25, 250, 148, 223, 179, 48, 55, 181, 58, 75, 86, 23, 85 ], "signatures": [ "69382b69dc4a90d077a35096aa28567ad16361d0d5f2ce032fa33814da17aa0b573c8eac2bbf0575186eaaf3a3d1b8e183905cbfec0a3d7ed8ab98bbcd543f04672a7ee03ba6a4a1b699bf00ceba10b4411ee90802e86dd4db4b40d4f79ac80e4221e3d1feaba32cdf368dea4a4ddf494dafa18fcbe43d9816bd05ccb7896f06", "cd0b2d981d77cfcd6f2b06eeee7e3331e0ac0640614af91aa1e108a3034ec909bf28575aedb15802878f131fff986ada291d820fac1003c7f1b7f20119f8f004d7267e92fd6f8d503111cd13836b5d8895063e26f9c3cdff5b25bc988562d001e15ff12465e18d2c2397e3d30a1329fcf256a9050cc526eda81f0da76e623607", "a87daadf16541fb0ce41adbeff5e33b441ba1f00d3307f40ecd901c66892b1008400b2ebb0f9b74c2b67c1aab35d04de8580d4f93768ee68d0b2697b74f4280295ebec0c0b151c2db3dea2fb5f740cabad08f55251d6d779cba7488fb24ba6056a6389e2c432c9ed55911c746bfc8400fc024c3d44c182285ed727554153bd0f", "2685fee6b557b0868e02d3621b730c9b79743e802c66bbf9d5158ff2347f2607a4e6ebeb9cf3c807c71ecb188b74c1d9bf4866e520e229c07d68b529bd35f00f314c5fe6a097b65b5cb69e77e7d907d71857c712aab2daf2d7e975cd603c300761992b225d56ebf5b448b2e0ac35a7a5afa377f4af8e7bd7afccd7531718e103"] }


Less details
source code | moneroexplorer