Monero Transaction bd64156a4fd50fa1aa4a2794ae71f87eb7fca32d4cbeb3785a689575a750043b

Autorefresh is OFF

Tx hash: bd64156a4fd50fa1aa4a2794ae71f87eb7fca32d4cbeb3785a689575a750043b

Tx prefix hash: 37eaa1518ef4f4f713ca46c60303aa41488927205bf967486764c69975c12878
Tx public key: 6e5b9dd84f50696daac6e1754ae5f2d9516e781d45371b0e3e4d3452c7feb51c
Payment id: 7b59b1db5987df20e3921973580940a9034f00ad76a47b8b6d50ccb54ac76f58

Transaction bd64156a4fd50fa1aa4a2794ae71f87eb7fca32d4cbeb3785a689575a750043b was carried out on the Monero network on 2016-11-18 08:47:11. The transaction has 2126658 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1479458831 Timestamp [UTC]: 2016-11-18 08:47:11 Age [y:d:h:m:s]: 08:036:16:25:18
Block: 1182263 Fee (per_kB): 0.010000000000 (0.013653333333) Tx size: 0.7324 kB
Tx version: 1 No of confirmations: 2126658 RingCT/type: no
Extra: 0221007b59b1db5987df20e3921973580940a9034f00ad76a47b8b6d50ccb54ac76f58016e5b9dd84f50696daac6e1754ae5f2d9516e781d45371b0e3e4d3452c7feb51c

5 output(s) for total of 9.790000000000 xmr

stealth address amount amount idx tag
00: c111c0e75217c5e8613d684f64b15684f3acead3221d289679f1888e0a912743 0.090000000000 281272 of 317822 -
01: f30bbaf337c57ad148894f95bad4c932b42ba50b32a2740f85f4a4b939d29b64 0.300000000000 918085 of 976536 -
02: c671b1a3fd60706cdd80768d5255d0916638acfac65ccc2df23008fcd909c75b 0.400000000000 648628 of 688584 -
03: e345ff0d77cc77080ac906a014227dd1e6b95c3d29f1fc615e3788b3b9e96ebc 3.000000000000 285508 of 300495 -
04: a4b732ee8205197b576d99cc6004b73fcddf8f8228368cf9fa979c983182d034 6.000000000000 196776 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-29 10:32:53 till 2016-11-18 06:02:51; resolution: 4.96 days)

  • |_*_________________________________________*_____________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________**|

2 inputs(s) for total of 9.800000000000 xmr

key image 00: d414bf5fb50c3e65878fd4ce7bb9b7b442cf1ba3df6ba08ac74b3977e01ad358 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e006ab47190c01c539e830a38256e8e6ab2a53f677f99124217f4a2b5553828d 00149977 1 9/37 2014-07-29 11:32:53 10:149:13:39:36
- 01: 09e63372b50e5d203b6b3e064a36174d27330e8dd9d4fde4c1fc185693352ef1 00450220 1 148/108 2015-02-24 11:45:55 09:304:13:26:34
- 02: 61c6122d67e9d6deaa8cd36d47e4cd77429dd90907aa3e71f991d9746be10e72 01182016 3 17/5 2016-11-17 22:10:47 08:037:03:01:42
key image 01: c171c4e47d1626d069ca756333755a8435bd1900f1709d34ae648f49f1065ad7 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fe6fd98c8090baf9b366eb64a8a1e6e47afce8807401c7724e6c3ae9470dc512 01177227 0 0/5 2016-11-11 10:33:27 08:043:14:39:02
- 01: b3204191eec2eaaa20d086c80a198346fc5a83b54f8677ca90e9d22edbbe8ea1 01179061 0 0/5 2016-11-13 20:47:59 08:041:04:24:30
- 02: b6bf9725e43bc4df174201011ff2a8397881b372687c9c3515c81739c7a094f7 01182171 0 0/5 2016-11-18 05:02:51 08:036:20:09:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 89090, 165246, 213753 ], "k_image": "d414bf5fb50c3e65878fd4ce7bb9b7b442cf1ba3df6ba08ac74b3977e01ad358" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 217954, 2341, 3921 ], "k_image": "c171c4e47d1626d069ca756333755a8435bd1900f1709d34ae648f49f1065ad7" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "c111c0e75217c5e8613d684f64b15684f3acead3221d289679f1888e0a912743" } }, { "amount": 300000000000, "target": { "key": "f30bbaf337c57ad148894f95bad4c932b42ba50b32a2740f85f4a4b939d29b64" } }, { "amount": 400000000000, "target": { "key": "c671b1a3fd60706cdd80768d5255d0916638acfac65ccc2df23008fcd909c75b" } }, { "amount": 3000000000000, "target": { "key": "e345ff0d77cc77080ac906a014227dd1e6b95c3d29f1fc615e3788b3b9e96ebc" } }, { "amount": 6000000000000, "target": { "key": "a4b732ee8205197b576d99cc6004b73fcddf8f8228368cf9fa979c983182d034" } } ], "extra": [ 2, 33, 0, 123, 89, 177, 219, 89, 135, 223, 32, 227, 146, 25, 115, 88, 9, 64, 169, 3, 79, 0, 173, 118, 164, 123, 139, 109, 80, 204, 181, 74, 199, 111, 88, 1, 110, 91, 157, 216, 79, 80, 105, 109, 170, 198, 225, 117, 74, 229, 242, 217, 81, 110, 120, 29, 69, 55, 27, 14, 62, 77, 52, 82, 199, 254, 181, 28 ], "signatures": [ "1a8404e396c8a2c8c37d95e3710171c9b95e4cc5616bab70136513168d43ba0ba5730765011dc5eefe7d974bec590dec6220a67152e5b23e9a4403f91e6188032c81353e1abfe90b8f4d728c50ef562b02c2816e7949bb2f86aa59f1441a060762ba74d5b415d245ede33459d62bf31ea1d908163bdb413444fe5c00f5557b002afe2fbe2a512265bd49d3d93dc85a79df6e38da35394a76ff350199baff1e0fb06bd742da9223f22fac46fb0d3e9e06092964b2ef76547170b46647fc454e0b", "a1743f9a333ed133a752adc0ee84f8bab5486fa7c8baff1c2f2c26ce5309180a43176f90c89f6131e9ec141142f7e2ea89d968419a823a7fc7896410c65310032b5dc9b562f34c6e9eac31a0fff0bf0f85b8ea203b2401f4f8973218f8e446069c5f5555e2851e0b100e249aafb7d8ff92ad5edfef6b6de04c3adef2ddff3d030768e19d5ea2bfccf858bf7c54165e41319d53b51fae08a90157d34c43cb8e06b52ed5c8c3461ad4f2d5f80f23bdeebbb5270c416e1f5bcf7cf2d7a4c22a9005"] }


Less details
source code | moneroexplorer