Monero Transaction b4bfa0da128d10ba7381757ed16b4f10238919dc561283417a88bfef3bac6ac9

Autorefresh is OFF

Tx hash: b4bfa0da128d10ba7381757ed16b4f10238919dc561283417a88bfef3bac6ac9

Tx public key: aa86322f275cb31f99fbba094d65fcc7807b712cb8ca2aa701406f2ac71455cb
Payment id (encrypted): a2eb88ee1cb79aa0

Transaction b4bfa0da128d10ba7381757ed16b4f10238919dc561283417a88bfef3bac6ac9 was carried out on the Monero network on 2020-01-11 23:44:00. The transaction has 1292156 confirmations. Total output fee is 0.000034790000 XMR.

Timestamp: 1578786240 Timestamp [UTC]: 2020-01-11 23:44:00 Age [y:d:h:m:s]: 04:336:15:02:26
Block: 2009244 Fee (per_kB): 0.000034790000 (0.000013686116) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1292156 RingCT/type: yes/4
Extra: 01aa86322f275cb31f99fbba094d65fcc7807b712cb8ca2aa701406f2ac71455cb020901a2eb88ee1cb79aa0

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: cf159379d41e87cbcdc6456d136001adf6a0daebfc5af178fa7711fc52932dd3 ? 14260441 of 121427085 -
01: 3996386de7eb9cbd26f10f2b4190b27470f40de51394ce2cb45be53e38e69c35 ? 14260442 of 121427085 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: bfa85ab70880be9abf2285bb7eb9be40d3e63abe6e9ef49d9a0ac65e1476c9c6 amount: ?
ring members blk
- 00: 9ad6363ccf0383fe1e8e41d0c4fd239fa9075cfb791aebd03ecefb8d8ea9ee4e 01865840
- 01: d244349b04a0f80039c8d759cc76dbd834fb2874ef4b29d4593bb35c1258aad2 01970865
- 02: 67bf84df838b8a7458e04076c0273cfbf30bfc72420177dafdf290fbe1509015 01973998
- 03: c4e115059a273f33310b24cba0cd36f171d314aac2f82c85e6c37ce88514d90a 01996333
- 04: fc74cb7018fcd971fa83ff3b710432daacc76f3a1b2976a4903be7a88d7b5291 02005964
- 05: 8e1c2e74792d114e599733cdfb7a66398bbc35e1a282bb6eec4319c3a3cb742c 02006066
- 06: e1dd7b09c81cd29430bace7b1ff58b761cef727c047a24a2b30d6a6e3243ec7d 02008968
- 07: df9fc0f29e9ef804c9e553e2ee9b6536d674386c9b8872adb4659e1b7ce52975 02009125
- 08: 275637fa5942f3da18da04f0ab9532b029e9144091002f5f546ea217ff0288a8 02009175
- 09: 37697ea7ad2ba830803618185441bdae92ed52aca103688ad4ab9fa424220fc3 02009175
- 10: 5b57be8eb8d8d3fb97571b670758b98c6e3e2de99a8b91d926173a7be3f4c77a 02009196
key image 01: a571e36d9cea284efb8516cf65c896887fb7e590bbc5f9ecfef157ef8617417f amount: ?
ring members blk
- 00: e22f4018df26a60c06db25158db1b430a29b59d0b29b6b7e40a0ef8a7d0ca2ff 01938590
- 01: 3f37ec348bbd4eb39d3c868a1ab9709d4e5c12d5b05b66e00d3a0ed05a98e262 01977584
- 02: 9599fd58c677b2066fa1ab47f8db8eb2c3d3ee825f1a00292a9ebe62405fddfd 02004537
- 03: 8395ffe24f2b71d59f8b8b116356a02c03497724ae30f58bdfd3218a4e3788f5 02006582
- 04: 7b33b551adc3e1cb282827e20172371fe390aede7da693100a644b4dfd05f49c 02007775
- 05: 404911b81270e72a39682ee61d34e237c18b733d1dee9e52a45bdfbe060cc990 02008910
- 06: 688e91bf147e243221910eadb57adf39fe2a9d46dbb8f81468fbbc35aded0b65 02009015
- 07: dc5ef179c6454a9cabb7a734de94950ffa5480dc02701dccaf25a04cecc640b1 02009069
- 08: ba09f65de8fe4701b6be47dc9481227758ef9bcb264759c86a208b9cac1892b4 02009184
- 09: a9b57160ea4a69abfed750555ccfc748c86af2972faeba412a88f9994613d6e1 02009186
- 10: e298fef606a4888949e7f2bf44504f65ca48c19cd641a8080a5971f19eacc8e3 02009188
More details
source code | moneroexplorer