Monero Transaction bb6ae4b1b86f214bcb69f49bf5ba84809ea639c07473c06ad97e0141cea38723

Autorefresh is OFF

Tx hash: bb6ae4b1b86f214bcb69f49bf5ba84809ea639c07473c06ad97e0141cea38723

Tx prefix hash: f8309210d41e62bdf75efeaaef2bb7110a85747113c0cc817dd1da3216c10d8a
Tx public key: 8792d7024698bebd39d10ecc3ae8bf7b4cbb9c252135ab116e415c7a6d3bb025
Payment id: 12e04c1078d6459a11893314a94ce3a2015abed46d0acd9fe5082e1765a38b04

Transaction bb6ae4b1b86f214bcb69f49bf5ba84809ea639c07473c06ad97e0141cea38723 was carried out on the Monero network on 2014-08-22 09:45:08. The transaction has 3127211 confirmations. Total output fee is 0.005597728139 XMR.

Timestamp: 1408700708 Timestamp [UTC]: 2014-08-22 09:45:08 Age [y:d:h:m:s]: 10:129:07:18:05
Block: 184352 Fee (per_kB): 0.005597728139 (0.011991785804) Tx size: 0.4668 kB
Tx version: 1 No of confirmations: 3127211 RingCT/type: no
Extra: 02210012e04c1078d6459a11893314a94ce3a2015abed46d0acd9fe5082e1765a38b04018792d7024698bebd39d10ecc3ae8bf7b4cbb9c252135ab116e415c7a6d3bb025

5 output(s) for total of 0.901402271861 xmr

stealth address amount amount idx tag
00: abf1e82b83a222f3b1da1a9ce1247d43ea1364f936fa65d3f2c3618941ac7114 0.002402271861 0 of 1 -
01: c642148cb94af918cb969b63e1cf36057f69c4550519e800db3190a24ffab014 0.009000000000 165911 of 233398 -
02: 0b9e3545e371be6695b19074f1a5e731f9ac0b3d0dbb020bf6e089fb8b70cc38 0.010000000000 338838 of 502466 -
03: a30b5cd351ebc83e3fba67565abb8da967f818c1166a1e2dfd3b4ece7b78b1b9 0.080000000000 96653 of 269576 -
04: 4d24ed1597949f9f7ed08c42eebb08566a03c83d088fd356504dd4cac0472d1c 0.800000000000 129536 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-21 11:29:50 till 2014-08-22 08:38:47; resolution: 0.01 days)

  • |________*_________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|

2 inputs(s) for total of 0.907000000000 xmr

key image 00: d615de010f295c97604b4c43bef785597eeec73e8b1faca84fb7cae6307981c8 amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9ca79fb44a615926bda7f198ca53a4114b1f2b04ebc7fca8f4d94f13da24cc28 00183031 1 10/6 2014-08-21 12:29:50 10:130:04:33:23
key image 01: 2d6a444863d78cbcc9e2700378fc85a69c25703b0a064a0291d2c1aa93040130 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1edd90a4bb9ecaa75afe9c78348fd102d0d02c103679a6e785b448902e4d9b3c 00184207 1 3/8 2014-08-22 07:38:47 10:129:09:24:26
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000, "key_offsets": [ 178052 ], "k_image": "d615de010f295c97604b4c43bef785597eeec73e8b1faca84fb7cae6307981c8" } }, { "key": { "amount": 900000000000, "key_offsets": [ 100405 ], "k_image": "2d6a444863d78cbcc9e2700378fc85a69c25703b0a064a0291d2c1aa93040130" } } ], "vout": [ { "amount": 2402271861, "target": { "key": "abf1e82b83a222f3b1da1a9ce1247d43ea1364f936fa65d3f2c3618941ac7114" } }, { "amount": 9000000000, "target": { "key": "c642148cb94af918cb969b63e1cf36057f69c4550519e800db3190a24ffab014" } }, { "amount": 10000000000, "target": { "key": "0b9e3545e371be6695b19074f1a5e731f9ac0b3d0dbb020bf6e089fb8b70cc38" } }, { "amount": 80000000000, "target": { "key": "a30b5cd351ebc83e3fba67565abb8da967f818c1166a1e2dfd3b4ece7b78b1b9" } }, { "amount": 800000000000, "target": { "key": "4d24ed1597949f9f7ed08c42eebb08566a03c83d088fd356504dd4cac0472d1c" } } ], "extra": [ 2, 33, 0, 18, 224, 76, 16, 120, 214, 69, 154, 17, 137, 51, 20, 169, 76, 227, 162, 1, 90, 190, 212, 109, 10, 205, 159, 229, 8, 46, 23, 101, 163, 139, 4, 1, 135, 146, 215, 2, 70, 152, 190, 189, 57, 209, 14, 204, 58, 232, 191, 123, 76, 187, 156, 37, 33, 53, 171, 17, 110, 65, 92, 122, 109, 59, 176, 37 ], "signatures": [ "7f62d3ddcc1e998b21a8cad66f1ab539f46191a9cb792b16e8bbcfa13599970af9131ebcfa46fdbd154c4bd252c0305984fb766a6d97dc6f6b96c09db4b01f06", "24793a8e3d710632b11dcad4ea1b28a652ac38bf228f677f79ee1bdcf7b6d20cdb2cd141e24bc421957d3480015215346bb4b6a2c924bc7510e5adf0b9e42e03"] }


Less details
source code | moneroexplorer