Monero Transaction 1bdcbd54e61c6cece5d0609562a33037fb4b906e6d275062cd6767c03dbc8325

Autorefresh is OFF

Tx hash: 1bdcbd54e61c6cece5d0609562a33037fb4b906e6d275062cd6767c03dbc8325

Tx prefix hash: 3ff03d1ffc84cf60857df80cc5bb1f111132dd8641cfbbb337736b488041fd22
Tx public key: b662be7021c63be0138be054a554371cb44d67f498b275ae44878c25ef6503e5
Payment id: 91e01d7c36bd33fa66e902ce18d6f16ab3fa6bac4eca56717b8739232f1ddc15

Transaction 1bdcbd54e61c6cece5d0609562a33037fb4b906e6d275062cd6767c03dbc8325 was carried out on the Monero network on 2016-10-20 18:32:48. The transaction has 2133393 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1476988368 Timestamp [UTC]: 2016-10-20 18:32:48 Age [y:d:h:m:s]: 08:046:02:48:03
Block: 1161771 Fee (per_kB): 0.010000000000 (0.020277227723) Tx size: 0.4932 kB
Tx version: 1 No of confirmations: 2133393 RingCT/type: no
Extra: 01b662be7021c63be0138be054a554371cb44d67f498b275ae44878c25ef6503e502210091e01d7c36bd33fa66e902ce18d6f16ab3fa6bac4eca56717b8739232f1ddc15de20daf3eacf94abba0cc0ee951c452120c161d331f5a804fe3621138a16aeefecb0

4 output(s) for total of 4.990000000000 xmr

stealth address amount amount idx tag
00: 96db49fa6f3a1f7a092915d4cc359ed569c80808bda7c67a88ea1b3a1f569416 0.090000000000 269306 of 317822 -
01: 81c6ba9fe622603d60b08492b0508047524ddbd6c44d117763373126c7be8e3e 0.900000000000 410600 of 454894 -
02: ae024c783ffb758b3f938c541dcea52f9dad7a45e0969181ec5b9635f6eeb7fc 1.000000000000 819028 of 874629 -
03: 30e51f8a0922aa5069d7210db9da623533be16a824b0dffeb6ec2c1a2450d92f 3.000000000000 280135 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-18 21:16:31 till 2016-10-12 23:54:18; resolution: 4.81 days)

  • |_*_______________________________________*_______________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 5.000000000000 xmr

key image 00: b48e2b4c251c5b56c1ce9788df4d1c06eefe46f10f18abad0598127a2973acf2 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 52f335183439c06d27c4e1c4c28f32c769e2dc49bfe430bacbd5ae099bb86784 00134728 0 0/6 2014-07-18 22:16:31 10:140:23:04:20
- 01: 180c6b29aa371d5bff4320fece27e26293ec3f9313b5c5179a8b91bc15ac811d 00416066 1 44/2 2015-01-31 15:18:48 09:309:06:02:03
- 02: 8da22faf837471fb16b5f927bc0ddee29a386ddf91ba377203edc5ae5fec1e5a 01156159 3 1/12 2016-10-12 22:54:18 08:053:22:26:33
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 59733, 83242, 89697 ], "k_image": "b48e2b4c251c5b56c1ce9788df4d1c06eefe46f10f18abad0598127a2973acf2" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "96db49fa6f3a1f7a092915d4cc359ed569c80808bda7c67a88ea1b3a1f569416" } }, { "amount": 900000000000, "target": { "key": "81c6ba9fe622603d60b08492b0508047524ddbd6c44d117763373126c7be8e3e" } }, { "amount": 1000000000000, "target": { "key": "ae024c783ffb758b3f938c541dcea52f9dad7a45e0969181ec5b9635f6eeb7fc" } }, { "amount": 3000000000000, "target": { "key": "30e51f8a0922aa5069d7210db9da623533be16a824b0dffeb6ec2c1a2450d92f" } } ], "extra": [ 1, 182, 98, 190, 112, 33, 198, 59, 224, 19, 139, 224, 84, 165, 84, 55, 28, 180, 77, 103, 244, 152, 178, 117, 174, 68, 135, 140, 37, 239, 101, 3, 229, 2, 33, 0, 145, 224, 29, 124, 54, 189, 51, 250, 102, 233, 2, 206, 24, 214, 241, 106, 179, 250, 107, 172, 78, 202, 86, 113, 123, 135, 57, 35, 47, 29, 220, 21, 222, 32, 218, 243, 234, 207, 148, 171, 186, 12, 192, 238, 149, 28, 69, 33, 32, 193, 97, 211, 49, 245, 168, 4, 254, 54, 33, 19, 138, 22, 174, 239, 236, 176 ], "signatures": [ "c5f79ac79fbd126ba1388ee9d351c1386af457682b00bea4a28b70546a7fe30be23431c1b7e11c35230717245d593f6428cdfc304dd578bc6de7a38ce4ee420fda0accea7885cfa907446ec4a4a1d9649f935990db7073e376265f89847f5206a5e98ce2a736e348b8d34c3d32e3ad062575c85e2c1d189391eed9cb2f7833035528fb21e27149a66a1406f6ed64e58f1093216e82a738ba04b8034a04b8fc0df22d2005382db4649acaae96403a10228544b790988c95c88de69e282420de01"] }


Less details
source code | moneroexplorer