Monero Transaction b2bd1d8d2a4aa3feadde8460bc1117045182df39405d0d40fb6751038a4c1ce7

Autorefresh is OFF

Tx hash: b2bd1d8d2a4aa3feadde8460bc1117045182df39405d0d40fb6751038a4c1ce7

Tx public key: 1216eb7852ac57ada9d3cd2a77028bd3b5a78f4a807b987d2a04e6e685b5f172
Payment id (encrypted): 551eeb37adc12de2

Transaction b2bd1d8d2a4aa3feadde8460bc1117045182df39405d0d40fb6751038a4c1ce7 was carried out on the Monero network on 2020-10-08 19:52:19. The transaction has 1173953 confirmations. Total output fee is 0.000024040000 XMR.

Timestamp: 1602186739 Timestamp [UTC]: 2020-10-08 19:52:19 Age [y:d:h:m:s]: 04:172:04:24:30
Block: 2204026 Fee (per_kB): 0.000024040000 (0.000009439018) Tx size: 2.5469 kB
Tx version: 2 No of confirmations: 1173953 RingCT/type: yes/4
Extra: 011216eb7852ac57ada9d3cd2a77028bd3b5a78f4a807b987d2a04e6e685b5f172020901551eeb37adc12de2

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 4ac9b2530a397b53297ce99944579a11dcc2f3da17d866af538bc5f1d94f529f ? 21605453 of 128920884 -
01: 609f3f2c41d7bc62f49e8ad58bb0ff0ba090fd5d8d90991cf600af3699c140e9 ? 21605454 of 128920884 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: b48d57316b86de6b6e25329533874ef72fd4406b604e617195911a1c1326eb72 amount: ?
ring members blk
- 00: 3b9f72c50d949229e17d00975901a1869a4b869d8dcde555eeda5494dba5ae26 01980578
- 01: 9b41479bb9166e2ad0b454a2149e0ca3a3add0d14687823ca66e6cf257e74f65 02171176
- 02: 8a2bc7714a8e02cea2538fd69c8f6ddf45099c77a93548ab5f90ff7616332058 02176240
- 03: 38d1525c0274ae6692183fd779945c8b256d90c5f2ff292036cfa6e4881c0d5f 02198427
- 04: d2b48888cf6f4e084ffd8ab2f78bd4de0aa5d43d0274de9307599f50348cbe5b 02199259
- 05: f30f24dfe9fcf8d6813912df0053f504d0c9bf65babca2a9de5fe6bb08787bbf 02202812
- 06: 599e5e1c4b6cdff5dfe35c2c78ba1d763651a698b8450d05fb43a5ee1cef9047 02203217
- 07: 4e1d3f84f36b180f51befa6b4f5aa71a32cc9aef47d52569831dca3a55a0c725 02203730
- 08: a49422fa7e7a6dc5b7ced3f633173654c3f3fa06d8bcbc006d61a6479e8475da 02203805
- 09: 16631cd339001a08131656f74c6a15ba8e1c46209251b5fd9b25e4e1d08cbbdb 02203896
- 10: e5b3bbfc78888e4392c9af5d4a23312a252ac16def8457fbdfaddaedb56f9b57 02204012
key image 01: 5a4d7e5400e0825c6c653b42b5b1e8b9217dc4d78e1edf3cde3c6dfb213d265e amount: ?
ring members blk
- 00: ed693999acff7f8db6c2e461e6af6f1e8b4076df28e91da248c1fadd09b202a3 02185185
- 01: 6a1a0a1a7584692d012b6fe72593bcb61d74e84378dc983ba55f210178460fc9 02200813
- 02: f5ed9ec71e3154d3b834dfe105d0883e76b0c3fcd39f87fcd22caef35524b42f 02202464
- 03: 9868f4a859158edca14d172c7938785a28299a25d1772ac3bda741de7dbb7250 02202801
- 04: 2a36d3b2fb127068e0cac73dadd183111a9bb857b6ac6e306f902cb1136625bd 02203153
- 05: 27bf9e4d30adfadd111050d381a1bbc46708207a29a2aa1cebe6967b3386d2c8 02203758
- 06: 6e6e35d6ae9a881a94d1c2e265258f71d36e71cf55545f75ba6896f3a4bb4a43 02203770
- 07: f77d94b1785b5bdb31efd7b5b38be1a3c0984351494cd3b53858ca8016e15dce 02203908
- 08: 0e939916f457c4114db0f278c89d038e57cdc7e8b5b3c39b528eacf616ddca0b 02203983
- 09: 6a189ccca2f71f67c82e111c09465e5bd1af106c11df2bac7a84c36f2792b4b2 02203996
- 10: cedf5cc59426fdc1b500d6df978b2c615dd8730d1541b4781e529913eb1f676f 02203997
More details
source code | moneroexplorer