Monero Transaction bd04f12cfdfa275265076148bd3103a8a630e4b04d35ffe275cfe0cdd1f4d5e8

Autorefresh is ON (10 s)

Tx hash: bd04f12cfdfa275265076148bd3103a8a630e4b04d35ffe275cfe0cdd1f4d5e8

Tx public key: 074c839110886d8a9116ac607fa899ab8b6bbf0e15c3d5a1f2617f627d6dd838
Payment id: 0000000000000000000000000000000000000000000000000000000002139265

Transaction bd04f12cfdfa275265076148bd3103a8a630e4b04d35ffe275cfe0cdd1f4d5e8 was carried out on the Monero network on 2019-01-14 12:13:34. The transaction has 1557748 confirmations. Total output fee is 0.000060180000 XMR.

Timestamp: 1547468014 Timestamp [UTC]: 2019-01-14 12:13:34 Age [y:d:h:m:s]: 05:341:04:37:52
Block: 1748762 Fee (per_kB): 0.000060180000 (0.000022490628) Tx size: 2.6758 kB
Tx version: 2 No of confirmations: 1557748 RingCT/type: yes/3
Extra: 022100000000000000000000000000000000000000000000000000000000000213926501074c839110886d8a9116ac607fa899ab8b6bbf0e15c3d5a1f2617f627d6dd838

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 0f9f35425712ddd3b81b7d739373a4c7823fcf14e0ea83e0b3aec490e937f46b ? 8589834 of 121922428 -
01: 27bb2afb05e54e6d474be83f1fa9baa11f0f9b27f19987955ea3c18894205d1e ? 8589835 of 121922428 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: ea242facde4ffbf5a739ec112ae1028e1235aac68fad885d641792706dfebd90 amount: ?
ring members blk
- 00: 3c1743e6f883f786dcee5905c97c442246fc119de22f40e2708de7c8479ee73e 01573987
- 01: f089e8abc5dd839e799ae426d02cd5f0259342f69c6ec768cc9bd6d85d485401 01627954
- 02: c497a1960d3e59ecafa0b293659ea18bdda8465c72acc68980b3834da1e46abd 01663548
- 03: 4432b0b6b973f7fc81c95e0b2167db1f6b6bbf55751cafd4f5f10c32cede4cfe 01681713
- 04: 2c3b7c7da5b6c81c6322bb970b0fa94a017410d688df72df56eb241cc1a2873b 01690765
- 05: 4dc34d94dc1a80002e713b1c7d4203a3245474a1166d2af114294e40c7dd822e 01691923
- 06: cfdb69ca602de9859542b7a53803a22c487f5efba3bf72e32d6486dd64eeab8b 01691928
- 07: 94c32b3ff6a1c7a528e3c8d57dd394a462653baf17830936256968af27e5e8ce 01692209
- 08: be9474985196d50a3a09b7eacf79050790b124d12302bbd9e5825e7cfcde8dbf 01692274
- 09: 6bc83b4978fdf7a039accd108bce74be891615b28a4b9b455645516ecd39a7cc 01692299
- 10: 6b0af02e200ef1c015ac8dc408be26d76e8c91971db695180410726285c5eebd 01692299
key image 01: 2b9979e8ff9e88e0269bc809c96ea2a88633c682337149b31cfff892c4bac778 amount: ?
ring members blk
- 00: e31ed4c8cd7eaa18e52f92fe61284d2b4983cd9b9a918094ba214792c0693efa 01686255
- 01: a6224e8fc6c0867c6d30857a17b6aed8305f054323d4bad371b5c81803e84efc 01686551
- 02: c6ca98bf2f62bbc5f24aee67c5ff3358d4cd300d832b44909b6db38c7652da98 01689344
- 03: bed6a2deefa4655b6be6f6a15724acfb36f5626f8064ebe9038d8ed432f75dfa 01689860
- 04: 5f238a7bdfec4d318aa817d133a103f44424d58d39206175178c66422d2bb701 01691239
- 05: caba671c460c078cce1ec3062d3ff65635618c6d94a732c28c81eb17d2ff297b 01691625
- 06: 341674895901ac06ea213db19e5071f1483cd364460bc7fe6a0057427cad89f6 01691833
- 07: 52736d7c88236839b4de4cd2949867b6c6bcf333ec4d0767c27c40a015e1e696 01691910
- 08: 571ff813a2d06a555fc7a1ea41156b7b439fde2bd74da22fd6fcbd03ef1c3d43 01692054
- 09: d4abe8b402d365a9627270bf89740a336fcc60f55446e1a6cc881e8b3bd44aba 01692219
- 10: 524798dbff55a0b603980dd217b35c284c8511189b9906993230ed0f9b42aa1e 01722699
More details
source code | moneroexplorer