Monero Transaction bd3a1c2376cec6bbc65c016e84bf6bf8e94357e14a8ed27584e977da2f005818

Autorefresh is OFF

Tx hash: bd3a1c2376cec6bbc65c016e84bf6bf8e94357e14a8ed27584e977da2f005818

Tx prefix hash: d4bdf9fa5715d4099554a3a9fa57f71d627f35684ed3f9de628c3f7f1db9bd72
Tx public key: ec116fd008d72b81aa537415262fd631235ba598210d363453f3622ea8b92420
Payment id: c7e26ce2cf071d8b8ca75ab4114fa7952e21ff211492bf28d015681b37b8b471

Transaction bd3a1c2376cec6bbc65c016e84bf6bf8e94357e14a8ed27584e977da2f005818 was carried out on the Monero network on 2014-11-14 02:18:16. The transaction has 2988726 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1415931496 Timestamp [UTC]: 2014-11-14 02:18:16 Age [y:d:h:m:s]: 10:019:07:29:35
Block: 303926 Fee (per_kB): 0.020000000000 (0.054323607427) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 2988726 RingCT/type: no
Extra: 022100c7e26ce2cf071d8b8ca75ab4114fa7952e21ff211492bf28d015681b37b8b47101ec116fd008d72b81aa537415262fd631235ba598210d363453f3622ea8b92420

5 output(s) for total of 7.980000000000 xmr

stealth address amount amount idx tag
00: ce8df4f48a24473bee690c768a4093c8071f1ee7a65bea078b9ef39ec6a46419 0.080000000000 104129 of 269576 -
01: 9f27b415477f0a6889c445357fd9809e0fc62d11fb82c5e8c5be52f99a54bec6 0.100000000000 627335 of 982315 -
02: a1c9a6df8a2d7e34807f6b8b230b662ed08d70bfa2b6e89e7e3b545941ae3608 0.800000000000 198078 of 489955 -
03: 2ee1f5f78022acf5b5fb05008e2eb5bb3e024b0e3c9bc66e2be715a56db3c48c 2.000000000000 129443 of 434057 -
04: 11c07b723e0781ebbea9f0e11d8f7f885dd60051d0da517200511cdad5c644a2 5.000000000000 123347 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-13 19:44:06 till 2014-11-13 21:44:06; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 8.000000000000 xmr

key image 00: 4a11f14fa142bfa4a67631c35653dbf91efc3ea4ecbc3d582d5c4270af3b24e1 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fff284ee70dbd9b9f8e73cf9e554b086f7300b0282b7abda4bbd1a65ab34418f 00303630 1 6/52 2014-11-13 20:44:06 10:019:13:03:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000000, "key_offsets": [ 23871 ], "k_image": "4a11f14fa142bfa4a67631c35653dbf91efc3ea4ecbc3d582d5c4270af3b24e1" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "ce8df4f48a24473bee690c768a4093c8071f1ee7a65bea078b9ef39ec6a46419" } }, { "amount": 100000000000, "target": { "key": "9f27b415477f0a6889c445357fd9809e0fc62d11fb82c5e8c5be52f99a54bec6" } }, { "amount": 800000000000, "target": { "key": "a1c9a6df8a2d7e34807f6b8b230b662ed08d70bfa2b6e89e7e3b545941ae3608" } }, { "amount": 2000000000000, "target": { "key": "2ee1f5f78022acf5b5fb05008e2eb5bb3e024b0e3c9bc66e2be715a56db3c48c" } }, { "amount": 5000000000000, "target": { "key": "11c07b723e0781ebbea9f0e11d8f7f885dd60051d0da517200511cdad5c644a2" } } ], "extra": [ 2, 33, 0, 199, 226, 108, 226, 207, 7, 29, 139, 140, 167, 90, 180, 17, 79, 167, 149, 46, 33, 255, 33, 20, 146, 191, 40, 208, 21, 104, 27, 55, 184, 180, 113, 1, 236, 17, 111, 208, 8, 215, 43, 129, 170, 83, 116, 21, 38, 47, 214, 49, 35, 91, 165, 152, 33, 13, 54, 52, 83, 243, 98, 46, 168, 185, 36, 32 ], "signatures": [ "81cf0866014df90fec54a3888aae94dd82409952690fcfe47dc9031200ea3907421d93e770df41e5120fc2ffffbd3624888514392b29edcd522ec1c848949502"] }


Less details
source code | moneroexplorer