Monero Transaction bd3fb1b3b0c3d7db7c7c469543eee76515159d074a06b32e6d01860f2ff482cd

Autorefresh is ON (10 s)

Tx hash: bd3fb1b3b0c3d7db7c7c469543eee76515159d074a06b32e6d01860f2ff482cd

Tx public key: 44d1083e66c5978a292d1be2e7d102ec2666bb58a8b7023f8848160c3fd922e1
Payment id (encrypted): 7df577c1a1890188

Transaction bd3fb1b3b0c3d7db7c7c469543eee76515159d074a06b32e6d01860f2ff482cd was carried out on the Monero network on 2020-07-09 07:00:41. The transaction has 1154731 confirmations. Total output fee is 0.000027270000 XMR.

Timestamp: 1594278041 Timestamp [UTC]: 2020-07-09 07:00:41 Age [y:d:h:m:s]: 04:145:13:25:39
Block: 2138263 Fee (per_kB): 0.000027270000 (0.000010699034) Tx size: 2.5488 kB
Tx version: 2 No of confirmations: 1154731 RingCT/type: yes/4
Extra: 0144d1083e66c5978a292d1be2e7d102ec2666bb58a8b7023f8848160c3fd922e10209017df577c1a1890188

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 99d6b7b8774b464c27c436581ae0a65d476daab2aa20f9992a3395ed6078b535 ? 18849840 of 120551742 -
01: 10834bc0f66bb7931c611eb59a0afdbf53156bbd014d52cd05c6784d16b359d0 ? 18849841 of 120551742 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: d545cabd28f17483cbebb4d75ba5ff615c4f7bfb037ca312dee9da5dee17ff18 amount: ?
ring members blk
- 00: 3fb5003c892ad70a55c104fd6de62e24a4f4c074be5d6beb9464fdf9b46f5b08 01461965
- 01: f885516c90a0fc17c3ac105e992f6e7e64a65d8ffd919462a4c894dc82df5087 01978961
- 02: 94546b227b2fd55b3de1eba9d9492aa947a181ae98f0f7fd5680015b5ca9f904 02117829
- 03: 047d84bf065dce2e79ed3b3e15c39a5fad9dfd3100ccec5c731d07e083c3adf0 02122034
- 04: 50449d12139a6eaf7ef010f9d0569deb2149f6af5d1b0d045a9dcb953c617231 02122036
- 05: 78f7fda5206ccba2a80152076b96aa4cf6989d01b6cfc6f62d2c1886f299d4ca 02126707
- 06: e34e559f29cb8fa7fcc601926bf58dc28e5a84f556e2e3494e417610d9462389 02128684
- 07: 5ff5030b9b86e1dbbae86f237ec73b634aa3db9fc183f60e12b1ca470a799c73 02136696
- 08: 1b2c1ff43898e39c456d9761ca1c12f15007e229f7b4e55b9fa5753e25ca3916 02137097
- 09: 7baaf10e96060b8a70116e81388f6eb2cb086224e29c5c9f2cf8d9e1a22beae4 02138086
- 10: b99bcd131d757237a83aa68f69307615cc73232d02bbb4ddae45c2117cf9545a 02138249
key image 01: 79fa0ac09086c1b2f6ed9b84f304a2482e142077d1a418306f12c49ef3ee467a amount: ?
ring members blk
- 00: 00d9ef86535725dff833aa30d6e712676b0c8a6cc146b2dabd90e5ae6debaba0 01961716
- 01: e963ec7cd19fc2a77cc72799ed187ea5796741920aa0686a226e5acf40d19e3e 02125272
- 02: 59aaef0b09fb564aef46136739ca4fdb4deb615d4a233980904ae348a517017b 02132419
- 03: b466c2067068ee173b509ca97df010180f67c19af637194d307a57164d4b1ec7 02136293
- 04: f3d81ff3b0b9fcc2770259c4031b9e6c01bbf5339ff6f8bbe18d5cd55871de67 02137086
- 05: f011cd896fccb63e8099129309f57c62e173e2a9498e2c5704200c31b103f37b 02137681
- 06: e336cbb3b035f907a112880115a59773059de166acbed649af479ab826eff528 02137798
- 07: e0dff920fc5ded374e3200399c639167be83f4cb15936a532890d66a11cc538b 02138137
- 08: 0be8c3bf60b454c6c57d08bdfc0b6be83b05a900c40b4b0a613fb263e56e0263 02138149
- 09: 90d4881af9b5c2c634a35795d7f03307b10f67e59f1346aeeacd91523c639a6e 02138188
- 10: 8f06a050f663c99163ea69fcdcdbd1235aa29bf33e13fc2e8f2b43dba9d0bc91 02138214
More details
source code | moneroexplorer