Monero Transaction 0bdc52bd92e4214f0252633b54c1b36c804732e0ec2d98c0479c104bc06801f1

Autorefresh is OFF

Tx hash: 0bdc52bd92e4214f0252633b54c1b36c804732e0ec2d98c0479c104bc06801f1

Tx prefix hash: 0e95a6d9b0f6e7047a182aeff7d2bff0eb80c3ee8913cc6de4008cd624611f8a
Tx public key: 0a159d13bc19608c9c09be4dec5aed0b06592e82e83cb626109ea0048fbdb68e

Transaction 0bdc52bd92e4214f0252633b54c1b36c804732e0ec2d98c0479c104bc06801f1 was carried out on the Monero network on 2016-09-20 05:02:03. The transaction has 2166338 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1474347723 Timestamp [UTC]: 2016-09-20 05:02:03 Age [y:d:h:m:s]: 08:092:00:47:17
Block: 1139801 Fee (per_kB): 0.010000000000 (0.024150943396) Tx size: 0.4141 kB
Tx version: 1 No of confirmations: 2166338 RingCT/type: no
Extra: 010a159d13bc19608c9c09be4dec5aed0b06592e82e83cb626109ea0048fbdb68e

2 output(s) for total of 0.990000000000 xmr

stealth address amount amount idx tag
00: e22a3d28a7b1ba223908690e64f365140d1949920b12fc1e878ecd00afe8d5d6 0.090000000000 257058 of 317822 -
01: 3df7a31cbbdcb0d28af49c4e045b1f3e360055321792fb3e4b2bdc03ec118153 0.900000000000 399622 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-04 00:15:11 till 2016-09-08 06:50:46; resolution: 3.61 days)

  • |_*______*___________________________________________________________________________________________________________________________________________*____________________*|

1 inputs(s) for total of 1.000000000000 xmr

key image 00: 17bfc79244b34924d1232fdd5a0eb1915d1921378edd4b171f24a386c99ef591 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 21e1e4b3679c3f6322ad832debe6417f8b56e9b8cbd45b3a58eb0938cfb1a194 00376611 1 17/33 2015-01-04 01:15:11 09:352:04:34:09
- 01: 5293ba894770149d4fd8663561b993b7bf3bf6138344ea44285dc30510cb1ca7 00413481 0 0/5 2015-01-29 20:04:10 09:326:09:45:10
- 02: 89299cbdcababcd644329b6bfae52124693d746a49084b87775cd0e9a995ee13 01074804 3 19/28 2016-06-22 01:23:28 08:182:04:25:52
- 03: dd2bf686062420d7c067e9b8cedd9477c1989d224e0f88c55ed3b33b8e354a25 01131235 3 9/6 2016-09-08 05:50:46 08:103:23:58:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 378859, 25307, 317129, 70661 ], "k_image": "17bfc79244b34924d1232fdd5a0eb1915d1921378edd4b171f24a386c99ef591" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "e22a3d28a7b1ba223908690e64f365140d1949920b12fc1e878ecd00afe8d5d6" } }, { "amount": 900000000000, "target": { "key": "3df7a31cbbdcb0d28af49c4e045b1f3e360055321792fb3e4b2bdc03ec118153" } } ], "extra": [ 1, 10, 21, 157, 19, 188, 25, 96, 140, 156, 9, 190, 77, 236, 90, 237, 11, 6, 89, 46, 130, 232, 60, 182, 38, 16, 158, 160, 4, 143, 189, 182, 142 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer