Monero Transaction 1bfd2d2e4a747a90069a0aea2e043589f65ea0a454a56e7a69b138425bf74d6b

Autorefresh is OFF

Tx hash: 1bfd2d2e4a747a90069a0aea2e043589f65ea0a454a56e7a69b138425bf74d6b

Tx public key: e6baed2981dc61e36272072be38c312e6eb90f92c20130602d10af3def66e7ec
Payment id (encrypted): bea1b4dd9017c492

Transaction 1bfd2d2e4a747a90069a0aea2e043589f65ea0a454a56e7a69b138425bf74d6b was carried out on the Monero network on 2020-04-14 09:34:56. The transaction has 1215277 confirmations. Total output fee is 0.000030690000 XMR.

Timestamp: 1586856896 Timestamp [UTC]: 2020-04-14 09:34:56 Age [y:d:h:m:s]: 04:229:18:17:09
Block: 2076463 Fee (per_kB): 0.000030690000 (0.000012036216) Tx size: 2.5498 kB
Tx version: 2 No of confirmations: 1215277 RingCT/type: yes/4
Extra: 01e6baed2981dc61e36272072be38c312e6eb90f92c20130602d10af3def66e7ec020901bea1b4dd9017c492

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 9bfa79aaf7c7492cb7d5b29514c6dfa7f9f172432d58aca22086a4dd3379bee7 ? 16316001 of 120429698 -
01: 8313d6b903529ba2f26a89836829d286a999ca9fd0fda1bf4ece42ca78c4342b ? 16316002 of 120429698 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 5db02e0a023d30ff8715d5c3de0e62e4517b7515c9b34311007acb992904ac56 amount: ?
ring members blk
- 00: 2436585e63851b151a7275b7f60382d32a465706fdc36ec72d875bb2369521a0 01644534
- 01: 5560893316f6b33b21e874732c1233130ccc12baa5d25928237eca7585b1d018 02022693
- 02: 164db57279ee139d397c9d0dc2085dc7e0fb6c8b18b2fecc39f3775afaf84810 02060029
- 03: c262d29102d2ab9b3e4ee0b7c106045c9a129467ed60cf2c1c836984a9c63bcc 02074715
- 04: e6c70596dcabd942ce1d4c3ccce6709e517492d505b96d64907b6b3e54aaf11b 02075388
- 05: 3ca1066a8c1fa854925bcc8b465c1a51ea8cb0832ba039caed09020603d49717 02075908
- 06: e0a9a04ed3ea3a9722a7c4d8c925cb92139a8dfbf6aaa81b947a69e3748d8559 02075993
- 07: 7e9bbeec84e0a2df58167523d467798c04c3c46f7492a0a5f808d80ba843bfe8 02076201
- 08: 279d5186e658f0e8bc5aedc1ff473e77ba24e96b141de8dbb0e9e728c2af0618 02076286
- 09: ad7cea6ee01818d050b125f55b0d5da608ac3da2832afb2090f1578ebff8f67f 02076336
- 10: 38936963a521c47ba4209605f9774f036ff71ed1920af3937913434e48fbba98 02076394
key image 01: 4b705cef91f9aff7dc98014bd57ac4b836061dfac724e9cf81670bb3827cae5a amount: ?
ring members blk
- 00: 796b205613be1e936939a9c72abcc05d8cfa64bd5dfee098c9fc2019f871ae67 01710963
- 01: 5f47fcf9c1bfabe161570b73994391f15236f3512e54dc328398dc0a87567896 01874631
- 02: ef3247d97a3f798c5ae8269e2ebb8037e4039c8adc2f7dc96d153d59dcf6dc72 02037276
- 03: 2a36752085007ca4fb3d7021495abfea0713a380778f8aaee75e40b50ed8ccf8 02060665
- 04: c462f8860b02edeafac174526ff6191f8079317b5db1004b85a277c95297b542 02073010
- 05: cd801925dc46c3b9a3377fd88f22c64f1ac7999e15aff2598ee289329b71e2b9 02073727
- 06: 444d8c76ba194a14d1c47814d2071f8db0d321fb413e0332ca56f24a0cc6a81c 02075010
- 07: bd1a13e2d25109abf88fac52c1d91992be302e3e4eb18d29435271a96ba1aadd 02075591
- 08: 6d1878ce3ab961887afb2b593d0ca8e77ff7dfcbc0c9c8c372d985894d37217f 02076136
- 09: 527a13747a43025734c319613bee7e79cc25228c3af2f51d2e3626a91c09d675 02076349
- 10: aaa156c8724425d873e2be9f3794d885f619883b2574d0fd789b01a43e501a7a 02076381
More details
source code | moneroexplorer