Monero Transaction bacc9d8a54b729b36a0a4dcb5c3335ea7f8fb5f0ea7431874b5226f194952040

Autorefresh is OFF

Tx hash: bacc9d8a54b729b36a0a4dcb5c3335ea7f8fb5f0ea7431874b5226f194952040

Tx prefix hash: ef6f6a2c78c9e1dca490d02b5ede1322756836a73744be47c1f2bcca4b14628b
Tx public key: d83518ea90d4904e4b647bf1f835613b46a0185fd313cc7595ec3ad8adf7afb9
Payment id: 9b450704328518288c21238324f7362b33b7d92dbfb10626aa7318dfd5ac36f6

Transaction bacc9d8a54b729b36a0a4dcb5c3335ea7f8fb5f0ea7431874b5226f194952040 was carried out on the Monero network on 2014-07-16 00:53:36. The transaction has 3112086 confirmations. Total output fee is 0.007192609026 XMR.

Timestamp: 1405472016 Timestamp [UTC]: 2014-07-16 00:53:36 Age [y:d:h:m:s]: 10:070:19:27:10
Block: 130472 Fee (per_kB): 0.007192609026 (0.011042326301) Tx size: 0.6514 kB
Tx version: 1 No of confirmations: 3112086 RingCT/type: no
Extra: 0221009b450704328518288c21238324f7362b33b7d92dbfb10626aa7318dfd5ac36f601d83518ea90d4904e4b647bf1f835613b46a0185fd313cc7595ec3ad8adf7afb9

7 output(s) for total of 8.642807390974 xmr

stealth address amount amount idx tag
00: 776fa848ba46ec3f21ca0e59ce24bb81923595c4c35bce2a091800467701a8bc 0.002807390974 0 of 1 -
01: fac224617f4bf490f8b5d9e3c14c5777fa5204bc578616a2d5760a73ad47be32 0.070000000000 83218 of 263947 -
02: 4638999bb87354ae8f92a2420de559ab97557992edce67681fcc7c39020cd2e5 0.070000000000 83219 of 263947 -
03: 254498b7785de2e1f26855cfa36396529660a753c66e9583ab8c6d47642cd11c 0.700000000000 67555 of 514466 -
04: 23c6acc7f5d335d39c2a3c5b8c81b248176da04736cace1bbc2834a711bcaada 0.800000000000 67106 of 489955 -
05: a079276c7dc527fbc06a756d7343cb280b31437981759ca69f369e28bb201bfa 1.000000000000 105748 of 874629 -
06: ceca4b7f4766d4b4fed2fdaa0fc00fd13041224a0c9e1c8a88dfbbe7483eb4ad 6.000000000000 69304 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-15 03:20:43 till 2014-07-16 01:40:11; resolution: 0.01 days)

  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |________*_________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|

3 inputs(s) for total of 8.650000000000 xmr

key image 00: 8176335d9ced158b4a9d1893f7745e8fe75e2d5c3a22548a4ae72a41c9872c01 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c288528a4e843ad8420ea71bbf505abe8c854a7f882bde416a3d1221e329d7f0 00129788 1 1/7 2014-07-15 13:48:43 10:071:06:32:03
key image 01: 65349e280ef2001d19480ccb30b8adda35c995846da2353581cb38fe36ad32a0 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9d61c54bb62b65a5c221ac855c3403673c16c839da1bc887e8667f88f8b627db 00129233 1 2/8 2014-07-15 04:20:43 10:071:16:00:03
key image 02: a167055a8265b0c931c14afb4673e3bde73cc049700f0c9d4e2039bf1acedc0e amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c0d63ccaef516318a325cd3b70cb069d8d05aba0843f777990d0092653949bf9 00130456 1 2/8 2014-07-16 00:40:11 10:070:19:40:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 86436 ], "k_image": "8176335d9ced158b4a9d1893f7745e8fe75e2d5c3a22548a4ae72a41c9872c01" } }, { "key": { "amount": 50000000000, "key_offsets": [ 104811 ], "k_image": "65349e280ef2001d19480ccb30b8adda35c995846da2353581cb38fe36ad32a0" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 9130 ], "k_image": "a167055a8265b0c931c14afb4673e3bde73cc049700f0c9d4e2039bf1acedc0e" } } ], "vout": [ { "amount": 2807390974, "target": { "key": "776fa848ba46ec3f21ca0e59ce24bb81923595c4c35bce2a091800467701a8bc" } }, { "amount": 70000000000, "target": { "key": "fac224617f4bf490f8b5d9e3c14c5777fa5204bc578616a2d5760a73ad47be32" } }, { "amount": 70000000000, "target": { "key": "4638999bb87354ae8f92a2420de559ab97557992edce67681fcc7c39020cd2e5" } }, { "amount": 700000000000, "target": { "key": "254498b7785de2e1f26855cfa36396529660a753c66e9583ab8c6d47642cd11c" } }, { "amount": 800000000000, "target": { "key": "23c6acc7f5d335d39c2a3c5b8c81b248176da04736cace1bbc2834a711bcaada" } }, { "amount": 1000000000000, "target": { "key": "a079276c7dc527fbc06a756d7343cb280b31437981759ca69f369e28bb201bfa" } }, { "amount": 6000000000000, "target": { "key": "ceca4b7f4766d4b4fed2fdaa0fc00fd13041224a0c9e1c8a88dfbbe7483eb4ad" } } ], "extra": [ 2, 33, 0, 155, 69, 7, 4, 50, 133, 24, 40, 140, 33, 35, 131, 36, 247, 54, 43, 51, 183, 217, 45, 191, 177, 6, 38, 170, 115, 24, 223, 213, 172, 54, 246, 1, 216, 53, 24, 234, 144, 212, 144, 78, 75, 100, 123, 241, 248, 53, 97, 59, 70, 160, 24, 95, 211, 19, 204, 117, 149, 236, 58, 216, 173, 247, 175, 185 ], "signatures": [ "eb8439ef82cc6253fef992d77751bef60e505f2e92ce0639afcec485f83bae02963c3ee1487cbee27a9701ec9b2e9f8d9f201c91c66dcbf74a3ab81e8eb9d304", "b6fc0f738e709738cf51d8f4116885bfb901bc5c5961c3fda28313615741e200bad9d59a32d3100051698b1647570f6a0208bc27aa94741f570c33fba84fb10c", "489e7ab9e3f85f2815073c2f65cf3d1d97400955ad8babac225542cc7dd2d20bccbe26aef75bd284c0d97c202c887de39716ca5b43ea9b7aa4fd0fc61f9e6305"] }


Less details
source code | moneroexplorer