Monero Transaction bb1ba16b1f3c16cbb30c85ff4c4bd24c3d192b6261e2bd70d528089c2586d854

Autorefresh is OFF

Tx hash: bb1ba16b1f3c16cbb30c85ff4c4bd24c3d192b6261e2bd70d528089c2586d854

Tx public key: 1f93090d040d48218e0acc3d789d87f8573d037fad1fd1d3c30dcbdc4d5d7c1b
Payment id: d323a78fce3e377df11619d6eba52a881624f1863d0d74a40635968c75aacf4c

Transaction bb1ba16b1f3c16cbb30c85ff4c4bd24c3d192b6261e2bd70d528089c2586d854 was carried out on the Monero network on 2014-06-26 12:07:48. The transaction has 3192613 confirmations. Total output fee is 0.005000292919 XMR.

Timestamp: 1403784468 Timestamp [UTC]: 2014-06-26 12:07:48 Age [y:d:h:m:s]: 10:163:03:19:39
Block: 102392 Fee (per_kB): 0.005000292919 (0.004990545759) Tx size: 1.0020 kB
Tx version: 1 No of confirmations: 3192613 RingCT/type: no
Extra: 022100d323a78fce3e377df11619d6eba52a881624f1863d0d74a40635968c75aacf4c011f93090d040d48218e0acc3d789d87f8573d037fad1fd1d3c30dcbdc4d5d7c1b

8 output(s) for total of 399.985000000000 xmr

stealth address amount amount idx tag
00: d749af7d1d30892c2cb55f241fccc81b8c70e168d7a600b4c3ca4536b1c04e5b 0.005000000000 177824 of 308585 -
01: 48013cc42620ba2526693d61ea751df4d82f7618fbc68f57fda98e2dbbb1f88e 0.080000000000 71201 of 269576 -
02: 83c056eead9ca13554d36fa80da2fb828f00efb0ad63050c953327a4644578c3 0.900000000000 30383 of 454894 -
03: 8a4f01fcf2881c620b29a834d62600bb79c73dfc78989e35e34f1fe19d538e22 9.000000000000 8008 of 274259 -
04: cfd2262d6fc4591829bf435b380162ef0bf4fc66f476e99afc6df4796dd9c399 20.000000000000 3560 of 78991 -
05: 5d777d87cfc4dd124ee56a9a0db0cf1f191c8b6aebcd919c388c499ebbd55220 70.000000000000 655 of 24819 -
06: 896af8ffeda11a53feea4c2caf1e1d4f6fa62d3867be6243a10639a68f122a61 100.000000000000 2322 of 57197 -
07: 4499056037ec74e1e128ea3853e54ef92365cc915f123c8e4f5ad151521b8126 200.000000000000 1394 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 399.990000292919 xmr

key image 00: 9f334d9da2697868f6d5a1da65bd208f0ec3ba48a9df5631f2eadf1513dfea5a amount: 0.000000292919
ring members blk
- 00: c5069118f599b391d1281d306afba86713ebf65842ef6d6110d247f8305a1f3f 00073969
key image 01: 867a446e3c4965c03f7bc3c7e630920d45c7ce375eacb6a0c86dc350abf7e250 amount: 90.000000000000
ring members blk
- 00: 40b0a4d3b7ff8c72399d67ccbb75759d2a14a6b350eda522af8a9f90d0f9547b 00102375
key image 02: 86af8cb4b113b510a67842f39cf143788c72ba580518c3a146d61e27727b65f9 amount: 0.090000000000
ring members blk
- 00: 4f2204490b2a0d27c1986cbc1d6d89c80a45670f674a1b11ad992ab8254f1183 00102375
key image 03: f0399adbc06c6bcc887dd312f21f66515f4ff699f6cdc1ffd92ca761cd946997 amount: 0.900000000000
ring members blk
- 00: 02d15cfbfdff20fa27158eddaa13923825d11fe961595fc6f2826f4daec8c813 00102375
key image 04: e61a943a3a6f9baeb32bfda1dd9c78c6296b245943b57902c6f026b733adbf42 amount: 9.000000000000
ring members blk
- 00: c1188eb7b2aa81dce862cd90aed0dc7caf63284e39285ec2017495337268d5da 00102375
key image 05: 73b2ed0bc2254d144ea3859a300ee0c294ec4a69e89d8327d7eaa4ff51c56346 amount: 300.000000000000
ring members blk
- 00: 4349e537d8e5da5ce25430a9655f29cce47aa7a192fd2bd0ef0a7a9722727cab 00102375
More details
source code | moneroexplorer