Monero Transaction 1bff809c578bc6a5d6f17f2cf353e311380266f0f1753d0e619af64e7b7aca54

Autorefresh is OFF

Tx hash: 1bff809c578bc6a5d6f17f2cf353e311380266f0f1753d0e619af64e7b7aca54

Tx prefix hash: e1b6d70278acec2c18e706f704bcade3e3ba121aa76ea0cc0654d2fe531ba7b8
Tx public key: ba8bebb5f7aaab22a538655805617732ddb5e3d5d39e048b13f68b7de6a57da5
Payment id: 0b3362ad1427aed7b101ee89ebae8bcc8c1a7e867958533b355ded0fd9d57aa6

Transaction 1bff809c578bc6a5d6f17f2cf353e311380266f0f1753d0e619af64e7b7aca54 was carried out on the Monero network on 2014-07-26 16:02:58. The transaction has 3132435 confirmations. Total output fee is 0.005242420000 XMR.

Timestamp: 1406390578 Timestamp [UTC]: 2014-07-26 16:02:58 Age [y:d:h:m:s]: 10:109:21:14:29
Block: 145915 Fee (per_kB): 0.005242420000 (0.006980803745) Tx size: 0.7510 kB
Tx version: 1 No of confirmations: 3132435 RingCT/type: no
Extra: 0221000b3362ad1427aed7b101ee89ebae8bcc8c1a7e867958533b355ded0fd9d57aa601ba8bebb5f7aaab22a538655805617732ddb5e3d5d39e048b13f68b7de6a57da5

9 output(s) for total of 7.002757580000 xmr

stealth address amount amount idx tag
00: 26f90a6b6cb999d23ef6349c5d9f3d4a3f3c94dedffb566dfb6b4197ebeb0fc2 0.000757580000 0 of 1 -
01: e6b60cad5636a86ad59cca760930af76864d26a6f5d6c7e8aae5221dc2112325 0.005000000000 195611 of 308584 -
02: a87431d360ac54c363dd1f6aa994618c274ae94668e4b71bade31469e2fa8e45 0.007000000000 165499 of 247340 -
03: 6700e673f9dc650dc1f90e70867b82cfccc1d8dd0566d9d99d681e298acfeecd 0.020000000000 203719 of 381491 -
04: 74208e1179187563bd570130084e807a3ab9a08a0025084916c7f50f36c94abd 0.070000000000 87665 of 263947 -
05: f92a3c162dd902b99a6d705d3b4a1d600247384bd0c9a2da1ac48aafa9520fb9 0.200000000000 262911 of 1272210 -
06: b7a2fc4da1d98c589daaf81d49b53e34204652a528b18b11a97d430dd9ff4ade 0.700000000000 82294 of 514466 -
07: 4d2dd2a95cc12b0315c30b7d5de240ed0981bce9ed7e0763a739c2c6c80de3b5 1.000000000000 137210 of 874629 -
08: b5f9cf330642f29adcce393af7d45c638d257c84d68042fa40504566a40cd7cf 5.000000000000 73152 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-04 19:42:53 till 2014-07-26 16:34:29; resolution: 0.49 days)

  • |_______________________________________________________________________*_________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 7.008000000000 xmr

key image 00: 9d10b0fc380b414ba12ec5b7f22b4d2a34d3a05161edb9af4f86a1de227af0ed amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3630fb8df66f7f416e1da12e1dfc7d1763301eadbab8c7c0752923d3a12b69b 00075743 1 2/61 2014-06-08 05:35:35 10:158:07:41:52
- 01: ea45d8354af7f64385a1ce6909d1f3bb5bf0bdda9645739efd4ceb1eb0807f2f 00145875 2 2/78 2014-07-26 15:34:29 10:109:21:42:58
key image 01: 4483aa231db7fadf428b1e2bfc73a061801326446ef5be8144040db5dc562d6e amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 409c4e29b2cbbf96a403a0acf214f3788691a0c7a639e97656fb687f4c389430 00024728 0 0/9 2014-05-04 20:42:53 10:192:16:34:34
- 01: 368ad9da95a5510905719caa08f90e8ed1c78a2255ad2dc2fc939a4ec711180d 00145875 2 2/78 2014-07-26 15:34:29 10:109:21:42:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 57812, 100604 ], "k_image": "9d10b0fc380b414ba12ec5b7f22b4d2a34d3a05161edb9af4f86a1de227af0ed" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 24490, 22212 ], "k_image": "4483aa231db7fadf428b1e2bfc73a061801326446ef5be8144040db5dc562d6e" } } ], "vout": [ { "amount": 757580000, "target": { "key": "26f90a6b6cb999d23ef6349c5d9f3d4a3f3c94dedffb566dfb6b4197ebeb0fc2" } }, { "amount": 5000000000, "target": { "key": "e6b60cad5636a86ad59cca760930af76864d26a6f5d6c7e8aae5221dc2112325" } }, { "amount": 7000000000, "target": { "key": "a87431d360ac54c363dd1f6aa994618c274ae94668e4b71bade31469e2fa8e45" } }, { "amount": 20000000000, "target": { "key": "6700e673f9dc650dc1f90e70867b82cfccc1d8dd0566d9d99d681e298acfeecd" } }, { "amount": 70000000000, "target": { "key": "74208e1179187563bd570130084e807a3ab9a08a0025084916c7f50f36c94abd" } }, { "amount": 200000000000, "target": { "key": "f92a3c162dd902b99a6d705d3b4a1d600247384bd0c9a2da1ac48aafa9520fb9" } }, { "amount": 700000000000, "target": { "key": "b7a2fc4da1d98c589daaf81d49b53e34204652a528b18b11a97d430dd9ff4ade" } }, { "amount": 1000000000000, "target": { "key": "4d2dd2a95cc12b0315c30b7d5de240ed0981bce9ed7e0763a739c2c6c80de3b5" } }, { "amount": 5000000000000, "target": { "key": "b5f9cf330642f29adcce393af7d45c638d257c84d68042fa40504566a40cd7cf" } } ], "extra": [ 2, 33, 0, 11, 51, 98, 173, 20, 39, 174, 215, 177, 1, 238, 137, 235, 174, 139, 204, 140, 26, 126, 134, 121, 88, 83, 59, 53, 93, 237, 15, 217, 213, 122, 166, 1, 186, 139, 235, 181, 247, 170, 171, 34, 165, 56, 101, 88, 5, 97, 119, 50, 221, 181, 227, 213, 211, 158, 4, 139, 19, 246, 139, 125, 230, 165, 125, 165 ], "signatures": [ "924659c965057404ca31df7365e7296e110ad53853a511b7e16c88e4c105870194c84d8380af4546468f609682420207d0f4b97898fa841dda847354f2d8e8072d729471adb9216293c7d035c4e4207a57d65fe4e27284000fd7fe63f6161b06e88d76b3a94ca1829db25989b36fd761e452893286682976ad114676711c260c", "a875850c1da57e576fc18a0cd29e43519ce36e9aed34b87ee28610d9e51d4a02b3aa791ae656b9c21aca23349918b6aa2e6e9b05c10d91ac2ef3ee5298c28a0f66eed39716ec97a86e27c8cdfe6899279dbd7a4d089847b2af879fa34405a10c3ffe7b11744cd09954dc69488d543e4d17756a977c9523f791013d7e1fc23a0d"] }


Less details
source code | moneroexplorer