Monero Transaction bb2fbd6cc12e5e0063b45182dd7c43dea5c2a6ca2a29b5f34b2e7fd9ee5ccbb0

Autorefresh is OFF

Tx hash: bb2fbd6cc12e5e0063b45182dd7c43dea5c2a6ca2a29b5f34b2e7fd9ee5ccbb0

Tx public key: 175a5210ea7746300d293de8ddbdfd6ca7a511f732db1795e59b3acf91b6c77e
Payment id: a16bd42e82c86e132516eeea6695a1660550da41052765983f876f9a38bedab1

Transaction bb2fbd6cc12e5e0063b45182dd7c43dea5c2a6ca2a29b5f34b2e7fd9ee5ccbb0 was carried out on the Monero network on 2016-12-07 19:07:21. The transaction has 2168884 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1481137641 Timestamp [UTC]: 2016-12-07 19:07:21 Age [y:d:h:m:s]: 08:095:09:57:43
Block: 1196309 Fee (per_kB): 0.010000000000 (0.012472594397) Tx size: 0.8018 kB
Tx version: 1 No of confirmations: 2168884 RingCT/type: no
Extra: 01175a5210ea7746300d293de8ddbdfd6ca7a511f732db1795e59b3acf91b6c77e022100a16bd42e82c86e132516eeea6695a1660550da41052765983f876f9a38bedab1de20fe2668387f7c33e05b4fde5c27d703a5bb6acc6cdd55afc810d88d1aa01accc9

6 output(s) for total of 9.010000000000 xmr

stealth address amount amount idx tag
00: 6387e67b16f932e347c7a80216fd20f8fe4a19efe5042d3658dc628d22c8ce31 0.020000000000 363189 of 381492 -
01: 24ed117eb8dca089ace1d225ec31d090f287e6a651c25b259fed8f17a8dfac4f 0.090000000000 289917 of 317822 -
02: 2c4630231f49e9078493b3ac0796130d56ae8069d7fda3b1a771a84885bcb786 0.400000000000 659981 of 688584 -
03: 7b32ef11e809471014b5bd231c609dc6658981ac85200f341fdef746230ae5bc 0.500000000000 1092881 of 1118624 -
04: af12161edd6bd7c67deb29d3651d74f6bbe0abd37743876fa9b3ce336742447f 3.000000000000 289398 of 300495 -
05: 7d5127815b220b69dfb58be005607a52990e93df517aba6758a37543cffa60e4 5.000000000000 243305 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 9.020000000000 xmr

key image 00: d27683d9fcffd427af61a5fc649b900cf5a3646509ab423acaa9dfc0b9c12972 amount: 0.020000000000
ring members blk
- 00: 5dde38a6ec8a96ecbe82d61134875f115a4192bcbcdbbaa87006f2d2da23c87a 00054482
- 01: 999a384c3bfdabba1374b521fed37cb63d89d175f568382fb4e4c194949c91ec 00057930
- 02: 53574fd497c6be8b42855de9c8fcb0f13a9ec0d0bd38e6a85a0cea246cfa503d 01196214
key image 01: 245cc689365aa9473b0246211d06acf7a476f0bf993522a355fe52a3d908e1d6 amount: 9.000000000000
ring members blk
- 00: 5a42fbf993f28086cdea33664f8d5c0e716f1408c9cc2dd09898d11763e6d07f 00661108
- 01: b2f2cefccd1cadff4550e940aa22692b0b4b8c33db63e6851899a441f2106a59 00696547
- 02: d57128b8ff358cbc5f275d3776d080748fe97ac651bd1d1fbb005a31c34da632 01196287
More details
source code | moneroexplorer