Monero Transaction 0bf0d45c207879ce97113e57d8323ef59e93acc3ccf59bf58ba336d12aab16bc

Autorefresh is OFF

Tx hash: 0bf0d45c207879ce97113e57d8323ef59e93acc3ccf59bf58ba336d12aab16bc

Tx public key: e5df6eaf5afec09faa73ba770d0fe0dc19753c1d8c9b21df8b595941ab11a3c6

Transaction 0bf0d45c207879ce97113e57d8323ef59e93acc3ccf59bf58ba336d12aab16bc was carried out on the Monero network on 2016-08-03 00:22:55. The transaction has 2196180 confirmations. Total output fee is 0.153000000000 XMR.

Timestamp: 1470183775 Timestamp [UTC]: 2016-08-03 00:22:55 Age [y:d:h:m:s]: 08:133:09:03:41
Block: 1105039 Fee (per_kB): 0.153000000000 (0.115539823009) Tx size: 1.3242 kB
Tx version: 1 No of confirmations: 2196180 RingCT/type: no
Extra: 01e5df6eaf5afec09faa73ba770d0fe0dc19753c1d8c9b21df8b595941ab11a3c6

9 output(s) for total of 1001.050000000000 xmr

stealth address amount amount idx tag
00: 35b2a860e27d49b9ee242376969aa24d4a90d88a5359aad644ab0efff3a89a73 0.050000000000 232288 of 284522 -
01: d6eec5a9a73591fd2ddf7aaeecd0fd7e37f9152f35225b4e9ab78b345fec30e5 0.200000000000 1144595 of 1272211 -
02: e72d797aff69659df9217088c170f9175d5bd651fd736f302cf8166d0e445fce 0.800000000000 428793 of 489955 -
03: b4667bf768ab867f0bcbba0167938b64b01ffccbcfe9539eaeaee27121d918c3 5.000000000000 216989 of 255089 -
04: cba17947a0f1b6133fcab58261d231eed280056ee69e0df12a102653e17b0ae5 5.000000000000 216990 of 255089 -
05: a8f40e78956d84e9d6ac9dfbffbdd2c3ae56e605f380e635f2a8a73486fd7f6d 20.000000000000 59212 of 78991 -
06: 290c43a244e97841fabb483bc0dbe88cf7a1fcc08edfab738ee20d4ee2dc2ce7 70.000000000000 15641 of 24819 -
07: 76b932441b468a09d83f9a16cfb5c35cdccc72e2ec5973d9f7e742ba7fed742b 200.000000000000 21820 of 31883 -
08: 147daf018f0551beaeb9c3a1a44608aaa3719df6922132ffcad31db26f9fb712 700.000000000000 3694 of 5886 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 1001.203000000000 xmr

key image 00: 20915a2cbc6da061dc12d317714f0c985ccaf9c0e1fda9d80290546697dd7c7b amount: 0.003000000000
ring members blk
- 00: cee6c82abc186bdb2294cdf99090c63dc0eeb1a4917e93c7f66cdf7723af4c67 00201625
- 01: 0ed8db37f5b1f27ad1a318d4d4daed8bd48edf732fd816680ec390db3a9664da 01034683
- 02: 62bb4c7d42c7bbfb2881eb8e4f4729b8fc31e8900675b73909773d9b6df2d73b 01101001
key image 01: 374b62f45797ce229e05291c2265fe9852a9a9e42e7ac20c705af2c4721a1a53 amount: 0.200000000000
ring members blk
- 00: 25ae018a0788d6819540ce870f326cd52c59d46293db66436ed8abc2433e171b 00137782
- 01: edd0e6e0b681ab87116452439f6eddceaaf010694a5db55b8049f35f69a0228f 00679450
- 02: afaa162e6ca02fceac01ac2902ec4665832e6bb3617f826aebe8fcc0c326e369 01100429
key image 02: 9ac6f103bf9dd5d8bfe2de5893d66201c8e0be62d92098904de563d69b694a56 amount: 1.000000000000
ring members blk
- 00: ef11aa06620da736ef7eeab92dbb6beb3bd63aad96ee296e46d56e923e6dc2ae 00245237
- 01: 2b1bb467d4adf812628ab99588ec049435e40568ba0e74f086a92bbb07c9ed58 00488333
- 02: e85b415ae26cfb1fa1e715873a9e8eb3ff57dddf43afa6503bd29936bf51cb59 01103829
key image 03: 79bb12135fe3f2e6bd93d46925ebe1ee445323b081208b0eeb17b068543d7a93 amount: 1000.000000000000
ring members blk
- 00: 0ff953b4979c12c1e529cf54ffbea1dbe5b7da12df1356e05f2546661b65fa55 00573194
- 01: 1346b0fb011e32a60d56265766208419e9ced871d16856e7481d4b76f2533d57 00621030
- 02: 4729336147796d0be837dd3b8aea8458baf54d979b56734157fe82dc9dc6dd5e 01097261
More details
source code | moneroexplorer