Monero Transaction bb0c60c31cdb328b13e671bceed738a4df8a94badfe30fcf3334465cf049c47f

Autorefresh is OFF

Tx hash: bb0c60c31cdb328b13e671bceed738a4df8a94badfe30fcf3334465cf049c47f

Tx public key: c399383c385e30f528822e19a0fba4e6085c63efe60c91bfa5e5086d0a1167ae
Payment id: 3e42e8d4eddcaf7f8e5faa5ed5451f58933f02258155e310e0d733a380eea898

Transaction bb0c60c31cdb328b13e671bceed738a4df8a94badfe30fcf3334465cf049c47f was carried out on the Monero network on 2016-02-05 09:03:35. The transaction has 2351192 confirmations. Total output fee is 0.048733990000 XMR.

Timestamp: 1454663015 Timestamp [UTC]: 2016-02-05 09:03:35 Age [y:d:h:m:s]: 08:302:22:20:52
Block: 942824 Fee (per_kB): 0.048733990000 (0.051982922667) Tx size: 0.9375 kB
Tx version: 1 No of confirmations: 2351192 RingCT/type: no
Extra: 0221003e42e8d4eddcaf7f8e5faa5ed5451f58933f02258155e310e0d733a380eea89801c399383c385e30f528822e19a0fba4e6085c63efe60c91bfa5e5086d0a1167ae

15 output(s) for total of 4999.951266010000 xmr

stealth address amount amount idx tag
00: 657a1c88ce756fbcaf5accdc5dc38d7e489710759597e7db7f0268eeed4ae1c7 0.000000010000 474 of 22371 -
01: 143929c3aadd24b86970dc28cba84dc4d0f5cf0db1d9425d51f209d859430de0 0.000006000000 19393 of 42147 -
02: f822b6e45b64dd10b0d9d84797a9ba1c0fe9e53f63214163190ee6b53a3f83e0 0.000060000000 35524 of 59217 -
03: 1fb248fb23b210acbe7eda2759c97b45c3faa81cf14dbaddd57a668ba62b0362 0.000200000000 36155 of 78038 -
04: 8e94b813c56f03100635f58015504ec7cf0c2b93fe7faa277f79bd5ae69199c2 0.001000000000 47629 of 100400 -
05: f7ee55eb4967293a42a0c91e01b4152216e774e64c87d1eedd6605bbf71c1f60 0.050000000000 205125 of 284521 -
06: 14a810933c6784f9e2719e88fdaa5e6abf710868b83dc4c4cd10a5389162fd07 0.900000000000 332293 of 454894 -
07: f0e5923afcb4bf4aa6be0f6290104b03dcd53acc0ca90fabe401f086103b3795 1.000000000000 677983 of 874629 -
08: 82195fbeb00b2acdc2327db79b797db7f90d6bc2644b92f6710f4c18cede6baa 8.000000000000 185857 of 226902 -
09: 9ddd944b9268586800314e34c876eaa75c165081e1194105ade5b8da7761e292 30.000000000000 28403 of 49201 -
10: 24ee09a392517d20a76486db28d45e3ae4ffcba28fa147e8f1123722a26e575d 60.000000000000 13065 of 26317 -
11: b507835d8d08604d7bae1f03c2f263cd390f5ccbebde55fb17832f7ebc250a67 100.000000000000 27524 of 57197 -
12: 3fdb977b591671bfff74b31a32a7dac81cb8074d9f58934e578dd391aa364110 800.000000000000 2394 of 5826 -
13: 491de1450bf360996e0ef120d18ce9e5bd59c024ec4e2ea25da2f8983238eb4d 1000.000000000000 5319 of 11881 -
14: c7fec5b93731d87fcf0a3c2b54a271420f7d84da2705d87b1bc543150156a91a 3000.000000000000 1303 of 2143 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 5000.000000000000 xmr

key image 00: 2c8e07e29c6a89146438dc5e674eecbcea79e8af1e4553c9e111101a19f84a2b amount: 5000.000000000000
ring members blk
- 00: 5ef745196aff2fe21931d49bf184220fd1e40e4014f39f146bf6e4058a0a1da1 00740783
- 01: 7d4842c129a5b2e95c73bdfae72a9b035eaea11ea3c52ed1dc135b0371995eee 00744549
- 02: 7637bf3b3c970976a56cb5a235af467d302580c5420123356713d07d20132a16 00789811
- 03: bc2ad0f4aaab386467df813d4b0c3990f752e978ddd8d6fe95a837b45eb10349 00942803
More details
source code | moneroexplorer