Monero Transaction bcdba8062dbe0ae206957b40d20951f6e9d35012df63ccfef6365e34eab47f68

Autorefresh is OFF

Tx hash: bcdba8062dbe0ae206957b40d20951f6e9d35012df63ccfef6365e34eab47f68

Tx public key: 4dfb51e3bce427a01ebdda639118b5195d7a971e5473e07edd766d21884a931c
Payment id: 43dce37c8d79683d72b35cfcb3a83b0dc9a08a5c8f7e7c37b583316fb587ab62

Transaction bcdba8062dbe0ae206957b40d20951f6e9d35012df63ccfef6365e34eab47f68 was carried out on the Monero network on 2016-11-11 04:40:29. The transaction has 2124233 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1478839229 Timestamp [UTC]: 2016-11-11 04:40:29 Age [y:d:h:m:s]: 08:033:06:36:03
Block: 1177045 Fee (per_kB): 0.010000000000 (0.017594501718) Tx size: 0.5684 kB
Tx version: 1 No of confirmations: 2124233 RingCT/type: no
Extra: 014dfb51e3bce427a01ebdda639118b5195d7a971e5473e07edd766d21884a931c02210043dce37c8d79683d72b35cfcb3a83b0dc9a08a5c8f7e7c37b583316fb587ab62de204b2eacf7153630e6153db167fc012de98b1b421313998c5fe095ecd3e6ee8dd2

6 output(s) for total of 49.990000000000 xmr

stealth address amount amount idx tag
00: 913d09fa336ef3427bbbfaafa1cf51493325bff3ae7c84290a4b4000a48f384c 0.020000000000 355583 of 381492 -
01: 677485e159c34fcca57aa2ef0ae262bfda52e8780bdd7e99148e6ae9f5bb889a 0.070000000000 238058 of 263947 -
02: 7943e3adee41f2e3e0f176170c93a960aefdaf084ea2ec7d0c19555cfa8e54d4 0.200000000000 1209124 of 1272211 -
03: 90bf79eb94c20e154be73ad26a512875a1b89c11785612e287b6950904a0f832 0.700000000000 486357 of 514467 -
04: 5927284cf8589449e940f5de24b1225a06d218363e330311dfa16f45f88e6314 9.000000000000 217745 of 274259 -
05: 328806d437be213ebd98a8eea72c7c934149aa61beb46565682d0a7b60f9a240 40.000000000000 37067 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 50.000000000000 xmr

key image 00: 3682415125e84ee55ad3d343467f734909d78ab6b09c6f77d5f047decf580b52 amount: 50.000000000000
ring members blk
- 00: a119390d8e03a0175224a277e69efa4bc2df6b933b9e0bc2c13f489c13610aa1 00151180
- 01: 6d0be1aeaf63dea757cb7a291a1c462d17b5ffdc4cab931de07a076d4704ce74 00162033
- 02: 2e8d3fb15a135d365a0438c5158cfce56d348bce8dbdbf2a2fc6e29557938b6c 01176798
More details
source code | moneroexplorer