Monero Transaction bbc5bb425ec6d25362491a7c865ac4348be239fea3e13a7e354c58afcfe342dd

Autorefresh is OFF

Tx hash: bbc5bb425ec6d25362491a7c865ac4348be239fea3e13a7e354c58afcfe342dd

Tx prefix hash: 382d3c607a73d4fd9aabb06dd993297da948715b01852f6205f88bc905e7a067
Tx public key: 4dee754e410da811fe15db327b2eebd8571166d0e869a105ea10774e609f75e4
Payment id: 26ae8d029c796f71cbdff13b8d4f7a3f704734f84b214ac7a1a9a5dd3765becc

Transaction bbc5bb425ec6d25362491a7c865ac4348be239fea3e13a7e354c58afcfe342dd was carried out on the Monero network on 2014-08-01 07:42:14. The transaction has 3087211 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1406878934 Timestamp [UTC]: 2014-08-01 07:42:14 Age [y:d:h:m:s]: 10:052:16:07:02
Block: 154049 Fee (per_kB): 0.005000000000 (0.008677966102) Tx size: 0.5762 kB
Tx version: 1 No of confirmations: 3087211 RingCT/type: no
Extra: 02210026ae8d029c796f71cbdff13b8d4f7a3f704734f84b214ac7a1a9a5dd3765becc014dee754e410da811fe15db327b2eebd8571166d0e869a105ea10774e609f75e4

5 output(s) for total of 11.295000000000 xmr

stealth address amount amount idx tag
00: d678fa2fedea16216ce372fc0ae0ffa1da0cda1a3cea03106071f196cde31f22 0.005000000000 199859 of 308584 -
01: d57d587d7a52aff183182aafb6d7db8a0eaf67a826dcb35e948e3b850988febd 0.090000000000 94885 of 317822 -
02: c7e07c506014c72eaa1ebb59fa90ee69e140f11759eb7dd5e6581a18c16fff64 0.200000000000 300260 of 1272210 -
03: cd7af27326bb0f273be79466be62456ef6ea54a80633f308e1b04be098a0459a 1.000000000000 155894 of 874629 -
04: b6d3ab18a2960cb9fac175ec7dd907710b9c911dd2227f32e412cc9229fa65fe 10.000000000000 176444 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-01 06:28:12 till 2014-08-01 08:28:12; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 11.300000000000 xmr

key image 00: 5d61951fd87cba1b386ca06b84a89277d764f1fc0b6f9498772a64d0cedbbc32 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f784eae01ef69341d7d0ebd369ce5fec7215fa5f516ce90311db3bc334d811d3 00154036 1 72/84 2014-08-01 07:28:12 10:052:16:21:04
key image 01: ea812a034eff1dc28686ae92e2491510358fe493b403159ba73fc22090f79179 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: efb188608fdefe041ea98ec72435aa89d9252b80a26b5d7b4cf1151f532315b0 00154036 1 72/84 2014-08-01 07:28:12 10:052:16:21:04
key image 02: 33b2cdfbd0e82d8c26be3000d37bf6bfd33c025c6cfed5a6f11c7dd94e8f3c5d amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1f816f3158ce48c28fd0346f6692ba367f85ddf376158ab0efb921d5730613a2 00154036 1 72/84 2014-08-01 07:28:12 10:052:16:21:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 138535 ], "k_image": "5d61951fd87cba1b386ca06b84a89277d764f1fc0b6f9498772a64d0cedbbc32" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 176427 ], "k_image": "ea812a034eff1dc28686ae92e2491510358fe493b403159ba73fc22090f79179" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 155885 ], "k_image": "33b2cdfbd0e82d8c26be3000d37bf6bfd33c025c6cfed5a6f11c7dd94e8f3c5d" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "d678fa2fedea16216ce372fc0ae0ffa1da0cda1a3cea03106071f196cde31f22" } }, { "amount": 90000000000, "target": { "key": "d57d587d7a52aff183182aafb6d7db8a0eaf67a826dcb35e948e3b850988febd" } }, { "amount": 200000000000, "target": { "key": "c7e07c506014c72eaa1ebb59fa90ee69e140f11759eb7dd5e6581a18c16fff64" } }, { "amount": 1000000000000, "target": { "key": "cd7af27326bb0f273be79466be62456ef6ea54a80633f308e1b04be098a0459a" } }, { "amount": 10000000000000, "target": { "key": "b6d3ab18a2960cb9fac175ec7dd907710b9c911dd2227f32e412cc9229fa65fe" } } ], "extra": [ 2, 33, 0, 38, 174, 141, 2, 156, 121, 111, 113, 203, 223, 241, 59, 141, 79, 122, 63, 112, 71, 52, 248, 75, 33, 74, 199, 161, 169, 165, 221, 55, 101, 190, 204, 1, 77, 238, 117, 78, 65, 13, 168, 17, 254, 21, 219, 50, 123, 46, 235, 216, 87, 17, 102, 208, 232, 105, 161, 5, 234, 16, 119, 78, 96, 159, 117, 228 ], "signatures": [ "97c1a9de49c7a783afae701ee2b68faef5b6ade5704a81a8c7b100be8aede20187a28654f9289f491c8d0e3c3353723c97e4b532d222211530b6388f741b9c06", "5b6ec908d63c08d38dc0a5c3089628466673936a68529d39126a996cb122ad0c90d7b760bcbdad4515c66b8c2af6c8bf27951679f5aa11e441e4627bd748c20d", "5eeb2ac2c1979ab983e496c7b9a2331550429afd174d0b8a463e5196971e10031fc76b338ef31aa91fd67ed8c78224cdafd0635e8b28ee20344317a28b256604"] }


Less details
source code | moneroexplorer