Monero Transaction bd3fffb1192c97164ce4ad5d9157d2ca682189611e4fbd3ee4424c3e9864a3fb

Autorefresh is OFF

Tx hash: bd3fffb1192c97164ce4ad5d9157d2ca682189611e4fbd3ee4424c3e9864a3fb

Tx public key: dad26e14bc2408cd836921e1abc5ca58a2810649b30ad25e93bc46267db12239
Payment id (encrypted): 91a034f10086313f

Transaction bd3fffb1192c97164ce4ad5d9157d2ca682189611e4fbd3ee4424c3e9864a3fb was carried out on the Monero network on 2020-10-13 10:01:35. The transaction has 1094670 confirmations. Total output fee is 0.000119430000 XMR.

Timestamp: 1602583295 Timestamp [UTC]: 2020-10-13 10:01:35 Age [y:d:h:m:s]: 04:062:05:18:49
Block: 2207453 Fee (per_kB): 0.000119430000 (0.000046874787) Tx size: 2.5479 kB
Tx version: 2 No of confirmations: 1094670 RingCT/type: yes/4
Extra: 01dad26e14bc2408cd836921e1abc5ca58a2810649b30ad25e93bc46267db1223902090191a034f10086313f

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 9552d964db9d0fdfb742e5c65dc52996bc43ba0516c6575ada6cb6843906d9ce ? 21801350 of 121502951 -
01: 97d96d8bfc8a802741ee72f0ca46041802d397c3ca74acc143ef4a5dc6b4dd9f ? 21801351 of 121502951 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 4b0d60bdc93360e575ad64c34886e7cf82ce69e5b54fa8fcbeefde3738be867f amount: ?
ring members blk
- 00: 840d6d46526e928f0b5560c09e9acf6b6ee17e624e2f12bd826e6957d4a83efa 02153765
- 01: 13ecea0ed90e823c015a1821284fa683bac9b3cb615c8ed3be57c539d1a757bf 02194849
- 02: 412df6175a23c40374e4ec3bfc07ebc3d29af14c3685e0e84df7c9d71fb730da 02198311
- 03: 30a3b359ea993efedfc7db41079e52813f4424b962e968ba5c08ae88c75b8d1d 02202740
- 04: 79903b77204bcaed3d59a0f50620b4dec3dfc551c11e1ff8095bccbb5f73cc4b 02204843
- 05: 1349458f4a3d952b61e2a710ea12cb83dc9e6e9f4a302d1aabbe3b1d498779d9 02205591
- 06: 9a0273ea18cfbc7a1d4dc5e6a4367854c51e7ce8da6fd333bfd38e99bda467cf 02206545
- 07: c7d8e9c6b67492b0d28ea24f2a3854b88f098f0d4d33acbf4db66aaf97e2bdfd 02206846
- 08: 15d74491bd6edc9f06a6ae7ec9c0da33fada0679beb33603661ce0f5f2841e09 02207307
- 09: 12dfbada4e4c3b08caff2c8ebec4a4365d1511afa0061e578d85c6a363e68e67 02207350
- 10: 2ec75d869f904cf97452f351544efe3841dfbf89f0b59011e4a4d671da901033 02207429
key image 01: 2dfed9af4429a747a753d3f0f7a7694f256c8d68684eb7f163f2174cc3bd0df6 amount: ?
ring members blk
- 00: e7435ddfe5e6a5795e9343750dd2b900ed7d99b6d0db0c87772d885f32c9e2d8 01315561
- 01: 175f4000885d14e21a1ff141ddecade8b3f7c6a7864d7e4fea011645c9479e67 02194114
- 02: 3995a80f5ba91ccb53978d86555a02e2fd69148e6379b3401f6f38fcb8023f10 02196906
- 03: bb45de655d9a4b10316b4df53f9500f40fd115e2108ac07ce1f530f07af539f3 02202527
- 04: c56020d8c69015dd03ee81695920b338387d1467c0a1ccdeb760db9c17526bb9 02204742
- 05: 44f565ac4e6e900aab9933e250555727a532e0644327c8cb6e3ad8d7bb59f87d 02205440
- 06: 7d40dff58429e2a3ba53752d48a4df139c42c8ecafd8b93d0701ebed26494872 02206845
- 07: a148de9a772e0d40758b9d8f500b12362357e6086c93eec02ebff7269569cb3b 02206892
- 08: d0da54fc7b608d75b640f031453832972ca762af5c56037fd68972c57538d183 02207160
- 09: 2931f5b9ae2605c7a88c6c25a4ce90f9fe052b343de1b0a4a811108ed92e2e2a 02207398
- 10: 5eeabb18573a17a7df2f0903fb04519dde01785f7a900571b296caddf0ce9c3f 02207413
More details
source code | moneroexplorer