Monero Transaction bb16a20c96ab4a0210cdeaeae2e2a3b5686508dd0ac380052e5274a118471ee4

Autorefresh is OFF

Tx hash: bb16a20c96ab4a0210cdeaeae2e2a3b5686508dd0ac380052e5274a118471ee4

Tx public key: 97f895373fbf7018742a9bdcfd29da0253d50d636be431fb608b2383d5ddd2a0
Payment id (encrypted): b857f2bd6dfbe1fe

Transaction bb16a20c96ab4a0210cdeaeae2e2a3b5686508dd0ac380052e5274a118471ee4 was carried out on the Monero network on 2020-11-26 22:57:28. The transaction has 1054030 confirmations. Total output fee is 0.000084730000 XMR.

Timestamp: 1606431448 Timestamp [UTC]: 2020-11-26 22:57:28 Age [y:d:h:m:s]: 04:005:11:16:10
Block: 2239361 Fee (per_kB): 0.000084730000 (0.000044109568) Tx size: 1.9209 kB
Tx version: 2 No of confirmations: 1054030 RingCT/type: yes/5
Extra: 0197f895373fbf7018742a9bdcfd29da0253d50d636be431fb608b2383d5ddd2a0020901b857f2bd6dfbe1fe

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 0c71405addb48fb6009be8a0b1e2eaa38f69248bd7f433585e8ada737528de77 ? 23716265 of 120585674 -
01: 9842fcf647306845e3632844efe6d3d06a12feaecb9860bb9896504a4c6baa29 ? 23716266 of 120585674 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: c91ea12224873cee193a7cb3cf645c16edc1a19cd96af9e28390474cf23d7868 amount: ?
ring members blk
- 00: beb08efeb847752e0058fa7cf5e15dd51b16fcbb4768e9d83b271a5d43351e3a 02195171
- 01: 85cd8a89adfc187fa449661c2fe25f78f220848c6578fd4260fa8118a65e1eff 02205673
- 02: f4b4c1813e867a4a9dc6b012dc62334c5e34fdac5e998edfe5710c04674060ec 02233197
- 03: 9d60a16f0c4e44972a404700addab146f2daa195988f1a3f5193d5018264df67 02236528
- 04: 283a780994dc82e90560ea2d1b8d714883558e1bbf7e9fa24fa009b0eb8a8c05 02237693
- 05: d3b6e6f8d5a80859dff161eda01b67839d1172732c2d41cfa2355dc0b2fd1541 02238740
- 06: c702f306983267e37ccc1f46896389c299ca43a671d39c0119c04181e54191e3 02238845
- 07: 03870ac5d0cf9be20448ba22b399f56a340d81e16f01be77e70266ce643d77df 02239185
- 08: 3fac2df3856ca880bda6704d126f79aceae5afe16fa26139b2d2dc4693a54bf5 02239343
- 09: f74427d5c52045d8267d9e27b692c5b2f2ea552c54116fee26050e589528c756 02239343
- 10: 01fbd84b1d31b80ea6195e32406148e7cf5f30239c845fbf1efd56ec3d1abcb4 02239343
key image 01: 7bb2e1a36f9e15c652a9087224e4ca395744d9feed130d0175415ba966e21b23 amount: ?
ring members blk
- 00: c60affe9af838d3a4c3899d59a10e0d38487ef3fae4b8156bed065cdac1f7c31 02138425
- 01: 1f4a3958cb4baf1c42748a38d8708a8ac335d74bca8d3860ce812439d5580f3c 02211418
- 02: 0f2a8f177dc7e36d423021a013894a7ec08cd3c04a156501f883930bdcc6e224 02226373
- 03: 89f4d81f86da455a1a4dbb3e2a66cf30970a0b38aab0f10e30ac6d4e3bedb221 02234159
- 04: 4cc7eb4ddccae1ac63c8c92ab4d231dae5e74bab11aa464fb571b6875ce43081 02237039
- 05: a48f6443a56975060cb6d14b0eb9267d6f3820d87e2d42ca13198beaeb1e3d87 02237258
- 06: d2aa6a87b06f13724f674a37e9b37a4ff31d7384e91fefd68a9f696096d05d7a 02237605
- 07: d395c67e4567fe5e99fce6b6c69218e376dd061a9ae9257b615d59da42518bd2 02238498
- 08: d88c39bd530e6dca643cc8acb77f849c02627f644f58ce12173d3007e511d902 02238910
- 09: 9c67d88f74d336636579b14dce23aff812073a5e96d618b2f6ffb527c6732ad6 02239118
- 10: fda227ba955f706ea4528d32eb7f70bcc693968831d46b4415730627bdd1b4f7 02239325
More details
source code | moneroexplorer