Monero Transaction 0bf2b5dff961e25747d968ba9b6a1509013ff89c8f91db90cd6b64d51bc65229

Autorefresh is OFF

Tx hash: 0bf2b5dff961e25747d968ba9b6a1509013ff89c8f91db90cd6b64d51bc65229

Tx public key: bab3fa4edb746acba2a345be864be1dd7eea655b09db0c73200bb1e92641befb
Payment id (encrypted): 65db4030c6163cb3

Transaction 0bf2b5dff961e25747d968ba9b6a1509013ff89c8f91db90cd6b64d51bc65229 was carried out on the Monero network on 2019-10-13 16:27:37. The transaction has 1351898 confirmations. Total output fee is 0.000039370000 XMR.

Timestamp: 1570984057 Timestamp [UTC]: 2019-10-13 16:27:37 Age [y:d:h:m:s]: 05:054:01:40:01
Block: 1943893 Fee (per_kB): 0.000039370000 (0.000015499762) Tx size: 2.5400 kB
Tx version: 2 No of confirmations: 1351898 RingCT/type: yes/4
Extra: 01bab3fa4edb746acba2a345be864be1dd7eea655b09db0c73200bb1e92641befb02090165db4030c6163cb3

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 13662d2067b3b1ec93b34427993a337e1252c31180c7ecf3e3012b54de892121 ? 12708527 of 120848111 -
01: dd05e2c1f34f535f53d677b2e9192f86718a0f16a9ba25054b454c59f42c7655 ? 12708528 of 120848111 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 8b83e542eb4b3ab8db81c687f498dd04a3e00fae6e7f8189897e31bbebe995cd amount: ?
ring members blk
- 00: b791274637fda2a33e9afc1f886074aa9621c746d7a46e79fa0c8afd51fcd8ee 01885518
- 01: bf058644226abbe62029f257f302f6f5041045d5d45ff1a4a2491bc4e7e5ac73 01904963
- 02: 851488d697b829fd8b0a8d4a1b2b7ec10a4fc14b26062c22593e7fc3396eb04e 01937952
- 03: c8c94991f21f80c13385be4b09a5f11ebddefe4e62ac93cc998f027f767c2705 01938570
- 04: b696e7c34bee3455a07fdd21536c14c616c7be056b2becc2361885cd2b683b89 01939587
- 05: 0db695377433696a3b84b1f59ec569afefbb91ac7ce3dcb19ab0e05475eda221 01943136
- 06: 6d2033b80cbbcd579c03938c8362c06a637b4640581933f21ffce128514a28a9 01943687
- 07: f0e333c2c1a28f4c4366efaacbbd93633aef94446ec4a8aba333aff2aaa21a85 01943748
- 08: 99c4b9874fa7ae13d02965ead13a3674eecf8d8fe9a8cc70ccd59ad768437cf1 01943748
- 09: 5d19f85218de58e43fc02fbdea771d7f78d1e269148d2c68f8f73f0215a1d149 01943844
- 10: cce0250c1364ef09ae476ca9a47b16114cdc33bdd72fda55d678420b14db21f6 01943868
key image 01: 4e82bf7df1f2f874376e7b8cacb74d321befffc3817226ccf600c40f1ae521f7 amount: ?
ring members blk
- 00: 5ecda1d054797795d670239386672b1954eba017c6b78ea145ec038f9eeb0dec 01852994
- 01: a298c6ed14c48128f14f2fb9b59dd7e06b8450c589bb0eb48276e72790d477b3 01886951
- 02: 46ec12401f0ee88b0e1f90df5fadb6b9fefd58dfee77dd8c512e272909eead68 01933214
- 03: c0bac5409eb9e4c9521a09fa98a3785df66d99bf9b7141dede9686afadb8e4c8 01935940
- 04: 1444d4c1e7eea861a1e7cc6de5d229cfc783e6741a38c80bef999c61759191b6 01942448
- 05: 3250053ea8d530522ae27346effbe678e819b413cf0b1400c70e446d1efcb76c 01942661
- 06: 4faaf3434a12a8b9415694329f76ebab5ea78eaffef82f85e588e4d41c3bba4c 01943233
- 07: 7a89c9de09de93733532bb757c90cf44f41907b4287f294bb0f595de1ea80ed7 01943239
- 08: c5b291914714a4655c923b227f83dba066d976719d051fe23186b31efdee63d3 01943840
- 09: 169a6e39902741bc621088272a9f88333b9e5559127fe5b35a586465c6846db3 01943844
- 10: e7efd3c8d2da488986c45afae8fcab41f6675e9d947083f28f299d679092dca4 01943864
More details
source code | moneroexplorer