Monero Transaction bb5c21669b6d3d1e8e813115e6488d97a0342b51d57bdd91f99a092e14b5739e

Autorefresh is OFF

Tx hash: bb5c21669b6d3d1e8e813115e6488d97a0342b51d57bdd91f99a092e14b5739e

Tx prefix hash: e0594285994a7e445eb25a66ee01041b6ef7707fd8c320cdcffe12c2cf8e3ec2
Tx public key: cf1c129df5d1f2ea6d4abecf6395e73686bf8c158f268d1af950c9ec21c933e2
Payment id: f6d774b39050b44974e268c2912e5a75456ce0fa01622f84a0b740500e072e91

Transaction bb5c21669b6d3d1e8e813115e6488d97a0342b51d57bdd91f99a092e14b5739e was carried out on the Monero network on 2014-08-12 20:55:36. The transaction has 3124528 confirmations. Total output fee is 0.005741910000 XMR.

Timestamp: 1407876936 Timestamp [UTC]: 2014-08-12 20:55:36 Age [y:d:h:m:s]: 10:115:23:35:44
Block: 170620 Fee (per_kB): 0.005741910000 (0.006241736561) Tx size: 0.9199 kB
Tx version: 1 No of confirmations: 3124528 RingCT/type: no
Extra: 022100f6d774b39050b44974e268c2912e5a75456ce0fa01622f84a0b740500e072e9101cf1c129df5d1f2ea6d4abecf6395e73686bf8c158f268d1af950c9ec21c933e2

9 output(s) for total of 6.994258090000 xmr

stealth address amount amount idx tag
00: 7daee56015c2936915202cc0140f47e0755314cfbbd7bd8608859359fa4d9905 0.000258090000 0 of 1 -
01: 12362cf9f323f5b7bda74b23b93db7ed1fab26c2995f4fb7a76e79bb2997f7f0 0.005000000000 209531 of 308585 -
02: 399b1d681167d3bb3a0fcb47b115405eb0642e73308909077da36262827a3bd4 0.009000000000 160980 of 233398 -
03: cd35fee770db27cfdc72e9f745755f8e6545c47c9f882cb48e8e49a64beac84e 0.090000000000 103688 of 317822 -
04: 9566f38b9658c85385c1e80d54dac13aa8d4b9559f2b48aa9037c1a2a1338fb4 0.090000000000 103689 of 317822 -
05: 6351df1e0cfd98d66b83ff5ef75edac97874c9fd75b0bd2b9ccce2b38e4642ee 0.300000000000 158999 of 976536 -
06: 50ddc10841149902ea57eb0eb1681fb040807f0419f7e65de6e78469cddbf857 0.500000000000 222255 of 1118624 -
07: cdd9a79858fcd29fd12a391cfe4f89983c3a0a31f74f022f59fa31645eaf79b2 1.000000000000 185441 of 874629 -
08: 7732f2d67b8649796d4c9ed68bb28263dbb43f01b3a5ebb7f8c8ea2945596c2f 5.000000000000 102830 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 20:31:44 till 2014-08-12 20:46:31; resolution: 0.36 days)

  • |__________________________________________________________________________________________________________________________*______________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________*________________________________________________________________*|

3 inputs(s) for total of 7.000000000000 xmr

key image 00: e564c93a1393048365c823d8b8f965f3c8a82222079830d629fd658f7e969e70 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9b8a48639d43d023af7c39bf28241b3f3faa4a98d8306cafb0ad23e869a43d88 00145948 2 4/7 2014-07-26 16:31:28 10:133:03:59:52
- 01: 8b7559383d9c3b2925e2836f357d56d88f32c2926650634bbe62cf887f2accf3 00170364 0 0/6 2014-08-12 16:54:31 10:116:03:36:49
key image 01: 376a6327ee0714d7faffdb16b7837d191f2e7ca1921ac4551402b3f06189ebd5 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d0746050bf4b13f25e4c3c8ceab0b7038394633002a69130d46dd69606e53296 00082518 1 4/40 2014-06-12 21:31:44 10:176:22:59:36
- 01: 2c7e10fee33f95dff02e6fa6dbd4969d63373b51d4e2cf07be8ab5ff05b1f1f6 00170539 2 8/116 2014-08-12 19:46:31 10:116:00:44:49
key image 02: bbe3770437c4762723ef84894f6dd305bb723a303e06667d3b278e63d5613903 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b57872aa7fdbf3e62b50cb5dcfd1f2839d9253ad4c5d2f6e74944ee148a2dab9 00136760 1 36/66 2014-07-20 08:09:06 10:139:12:22:14
- 01: 68cd81b6dbdfb21de8d35da6a91d19274b54098377a0cce5567c8d07da21784d 00170388 2 5/72 2014-08-12 17:19:37 10:116:03:11:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 28152, 8442 ], "k_image": "e564c93a1393048365c823d8b8f965f3c8a82222079830d629fd658f7e969e70" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 18723, 166666 ], "k_image": "376a6327ee0714d7faffdb16b7837d191f2e7ca1921ac4551402b3f06189ebd5" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 47534, 24986 ], "k_image": "bbe3770437c4762723ef84894f6dd305bb723a303e06667d3b278e63d5613903" } } ], "vout": [ { "amount": 258090000, "target": { "key": "7daee56015c2936915202cc0140f47e0755314cfbbd7bd8608859359fa4d9905" } }, { "amount": 5000000000, "target": { "key": "12362cf9f323f5b7bda74b23b93db7ed1fab26c2995f4fb7a76e79bb2997f7f0" } }, { "amount": 9000000000, "target": { "key": "399b1d681167d3bb3a0fcb47b115405eb0642e73308909077da36262827a3bd4" } }, { "amount": 90000000000, "target": { "key": "cd35fee770db27cfdc72e9f745755f8e6545c47c9f882cb48e8e49a64beac84e" } }, { "amount": 90000000000, "target": { "key": "9566f38b9658c85385c1e80d54dac13aa8d4b9559f2b48aa9037c1a2a1338fb4" } }, { "amount": 300000000000, "target": { "key": "6351df1e0cfd98d66b83ff5ef75edac97874c9fd75b0bd2b9ccce2b38e4642ee" } }, { "amount": 500000000000, "target": { "key": "50ddc10841149902ea57eb0eb1681fb040807f0419f7e65de6e78469cddbf857" } }, { "amount": 1000000000000, "target": { "key": "cdd9a79858fcd29fd12a391cfe4f89983c3a0a31f74f022f59fa31645eaf79b2" } }, { "amount": 5000000000000, "target": { "key": "7732f2d67b8649796d4c9ed68bb28263dbb43f01b3a5ebb7f8c8ea2945596c2f" } } ], "extra": [ 2, 33, 0, 246, 215, 116, 179, 144, 80, 180, 73, 116, 226, 104, 194, 145, 46, 90, 117, 69, 108, 224, 250, 1, 98, 47, 132, 160, 183, 64, 80, 14, 7, 46, 145, 1, 207, 28, 18, 157, 245, 209, 242, 234, 109, 74, 190, 207, 99, 149, 231, 54, 134, 191, 140, 21, 143, 38, 141, 26, 249, 80, 201, 236, 33, 201, 51, 226 ], "signatures": [ "9eea776a5dd97ac35c7dbedb66c820cd180ac6f9a8f085d07144be0dfa6cbb094eaf44b0c60c5534e623c16da4aa18c90fe2230a84986bba82a19ee559b432057b367310e0609d73345cad7ff657b1a2d762f292894830aa4d4de5798fadfa01d65e4ffbd935e9582a1af64367a1f7071d04724ed536e26b6dbf3eecebff3202", "c3a6064bdbd57f0da316825f2e898e0e138b5b04911b44d80402e9a93547fb07561177ce2e89d78d3beb6221e507bc128480fe786d0cc088f901f50ea75fef0a8c6c3af8f998c24b1b1502a2c363d67bab5ec30eedc494ad936e0965a7bb880041f9f21b3926359d76a6d0a819e60c1056abbea63e9cae9b295b6ca2a3580f08", "673d6da2c4928167fb7a0af095dc2456798244bea649f56bfa84eff6b5621305d67299f362674fe6aade18b0d902f3a62a65dd04884645f618306af351b479022b5a36c8e86d649ab555cf5b37cbf584b45c5d3e4b7ac304e93b916a37bba3056b7a10b036bc96af7885498afd9521cff50aedc0a0c3565f0fed7870a8bc7e0b"] }


Less details
source code | moneroexplorer