Monero Transaction bb0d7e6ad66339f07c476c692c10aa04e00a16adce185b49683073d5aa125e96

Autorefresh is OFF

Tx hash: bb0d7e6ad66339f07c476c692c10aa04e00a16adce185b49683073d5aa125e96

Tx prefix hash: 8eca6f6c98d0434dd9a4b44e6cd7dc865349ea3b966edc57f808674de98e271c
Tx public key: 81c10ee2f13c8310aab7d168e3de800bb441068ee830eabd29536f1e16f48d2e

Transaction bb0d7e6ad66339f07c476c692c10aa04e00a16adce185b49683073d5aa125e96 was carried out on the Monero network on 2014-06-11 19:05:02. The transaction has 3160703 confirmations. Total output fee is 0.007749928691 XMR.

Timestamp: 1402513502 Timestamp [UTC]: 2014-06-11 19:05:02 Age [y:d:h:m:s]: 10:103:16:31:44
Block: 80890 Fee (per_kB): 0.007749928691 (0.021219056095) Tx size: 0.3652 kB
Tx version: 1 No of confirmations: 3160703 RingCT/type: no
Extra: 0181c10ee2f13c8310aab7d168e3de800bb441068ee830eabd29536f1e16f48d2e

6 output(s) for total of 0.292250071309 xmr

stealth address amount amount idx tag
00: 264f4278c618c3891d9fe8d7ec5ff3d7be4cde4f2983ab118dc6e69d4c97a87e 0.000205531012 0 of 6 -
01: a7039a47b3c950353c4f2123e63bf6481d310e6dd5ff1d7672433bc0832f6f42 0.000411062024 0 of 4 -
02: b1bd33e6e44df5205c71ed368ce6fc178bcbf9bf687707644f50fde9fa86dfb1 0.000411062024 1 of 4 -
03: 088d7f7a9075a097ee7e5ca42ed4b95566adc62027de1494a35683aa848df6ed 0.001222416249 0 of 1 -
04: d968a5c36a1ca89eae9a675317bc3878b9b2632f256c18f0c5ed41353c760eef 0.090000000000 34541 of 317822 -
05: 6a452ddca394aae638067d7f284ee06adb59dc9c4b78c37bb6e4f01a8f11da9b 0.200000000000 36204 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-11 17:51:10 till 2014-06-11 19:51:10; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.300000000000 xmr

key image 00: b796c6f7c2f06aa636ae56dc91f9dc6e6c582622282b3f0ca516539d1b7e25b3 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1b2c0d771f9b2b1a4076510b7f7b3c86e208280cfa869715159b69bc3d8491ef 00080874 1 4/102 2014-06-11 18:51:10 10:103:16:45:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 29934 ], "k_image": "b796c6f7c2f06aa636ae56dc91f9dc6e6c582622282b3f0ca516539d1b7e25b3" } } ], "vout": [ { "amount": 205531012, "target": { "key": "264f4278c618c3891d9fe8d7ec5ff3d7be4cde4f2983ab118dc6e69d4c97a87e" } }, { "amount": 411062024, "target": { "key": "a7039a47b3c950353c4f2123e63bf6481d310e6dd5ff1d7672433bc0832f6f42" } }, { "amount": 411062024, "target": { "key": "b1bd33e6e44df5205c71ed368ce6fc178bcbf9bf687707644f50fde9fa86dfb1" } }, { "amount": 1222416249, "target": { "key": "088d7f7a9075a097ee7e5ca42ed4b95566adc62027de1494a35683aa848df6ed" } }, { "amount": 90000000000, "target": { "key": "d968a5c36a1ca89eae9a675317bc3878b9b2632f256c18f0c5ed41353c760eef" } }, { "amount": 200000000000, "target": { "key": "6a452ddca394aae638067d7f284ee06adb59dc9c4b78c37bb6e4f01a8f11da9b" } } ], "extra": [ 1, 129, 193, 14, 226, 241, 60, 131, 16, 170, 183, 209, 104, 227, 222, 128, 11, 180, 65, 6, 142, 232, 48, 234, 189, 41, 83, 111, 30, 22, 244, 141, 46 ], "signatures": [ "2536f7f50203d8f9d8c475f4f918ce1b3b1dfa6feae2ccc7b402db44b1391304149b20fe0131db5e1f4391ccba1b4b189b8fa5714797be47167239932ce47d0a"] }


Less details
source code | moneroexplorer