Monero Transaction bd53086703adf2f6a25b1a3edd5704c8cd7f671791043c7758d35a8b85f5d97d

Autorefresh is OFF

Tx hash: bd53086703adf2f6a25b1a3edd5704c8cd7f671791043c7758d35a8b85f5d97d

Tx public key: ceb4ad6257e8b5892d63ad926096b11ca9bf4c1773341f1e75e1d09d780eb470
Payment id: a87a0ade96ef304f04055b90cd893ba2a772aa4749e4adafc693b572e260df9c

Transaction bd53086703adf2f6a25b1a3edd5704c8cd7f671791043c7758d35a8b85f5d97d was carried out on the Monero network on 2014-10-18 20:59:08. The transaction has 3038956 confirmations. Total output fee is 0.177555559637 XMR.

Timestamp: 1413665948 Timestamp [UTC]: 2014-10-18 20:59:08 Age [y:d:h:m:s]: 10:063:14:12:23
Block: 266651 Fee (per_kB): 0.177555559637 (0.171849615376) Tx size: 1.0332 kB
Tx version: 1 No of confirmations: 3038956 RingCT/type: no
Extra: 022100a87a0ade96ef304f04055b90cd893ba2a772aa4749e4adafc693b572e260df9c01ceb4ad6257e8b5892d63ad926096b11ca9bf4c1773341f1e75e1d09d780eb470

6 output(s) for total of 20.664321590000 xmr

stealth address amount amount idx tag
00: a6ef313bb42d9f577dd6d586b078e6045425053336b8a04351e70fee5851c637 0.064321590000 0 of 1 -
01: 701fcfe00220e4597afc2410ed87ed76674a8fc83ecaee8ca6523d980bbebd89 0.100000000000 603159 of 982315 -
02: e30bac92a5745d802a17b0cd15e2faa169c8825e88d9c961820823e4e344d4e4 0.500000000000 388463 of 1118624 -
03: 8910737f6ca5caedb198c742fa7a4d6db0273c3cbc30b45ad9dfd7b639f20118 1.000000000000 307940 of 874630 -
04: e6aadd1b14efcefeb81a380088dbb242df5b7d7dcf3f41aa598f05e74e1faacd 9.000000000000 23787 of 274259 -
05: 46dd06f273b7aaecf66b0bfee43e478eff3496cd0174a3fdb94aa9a78cc9e26f 10.000000000000 310511 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 20.841877149637 xmr

key image 00: cc5ba45045295fc7ab50107cf6b7e922effc1f104d63f2922d18feae937bcaeb amount: 0.041877149637
ring members blk
- 00: 6afe68a7406a0458f363512f7c2240a674f9c8f7e5f0b7155c58b87681094742 00245551
key image 01: b52d2fd57b3544c55853036af22e802e6ef32690a39d4907be0a1e3a7ecfa4ac amount: 10.000000000000
ring members blk
- 00: 015a19b4a9ab3f391d230c7bc43d10806e3f1b8afc2ee00d7263a2c049110b9e 00266553
key image 02: 0be978d0cbeb12c1b487c136ddac2b6ac877b7d1bfeded1a14982c995b52a0a3 amount: 0.600000000000
ring members blk
- 00: 42965f45d47f6acc96bf4969d4246b65e99dd3acd411c1a6163fd9251aaa000e 00265430
key image 03: b59cb8bc24b92f1aa83756e39222fb53c08dfcd02a39ca62fbfa4cca6017e056 amount: 0.600000000000
ring members blk
- 00: d67013b5328f418ce6bbac6bb298b4bf863b7669cd65852548d721d814e96721 00266175
key image 04: d2008601030fb05e0b071d3e63e98eea76916a5c0c38e45c314ab5a9f584101a amount: 0.600000000000
ring members blk
- 00: 6f74fb50a8755d97a2f56b88d2ed51b36d45008abd230f9c09fdfa1c49870c74 00266490
key image 05: 4176a8e0c218a5ba0ed625e52d9f6cd283d85275665bec754240df40490fd964 amount: 3.000000000000
ring members blk
- 00: f0bf8ac7dd979a0a8bfd5e0d683d80bde3f26014707f9733b0a5968be8c7e412 00266378
key image 06: 015727068e1d461199214e5edc52b0477427ad63a4b4c792feebf3fadf3805b9 amount: 6.000000000000
ring members blk
- 00: 3b336f13a4317cc56f5f4e86642a5c685480d503e81d2ffccc9b83f4f8f50623 00266623
More details
source code | moneroexplorer