Monero Transaction bd6904d6271ce4a0e54546cd20915f6e60f442f023fe6bc3ade5005fd0dddac3

Autorefresh is OFF

Tx hash: bd6904d6271ce4a0e54546cd20915f6e60f442f023fe6bc3ade5005fd0dddac3

Tx public key: 99deb3e50943e341acf1ce58f9c89cb8d03ce67be81bdf9d371bd99ad6fbde5b
Payment id: 9b64e1213ca95c0cb3407ad24c84500f68e53a16d6aa391c91786653ab51cb26

Transaction bd6904d6271ce4a0e54546cd20915f6e60f442f023fe6bc3ade5005fd0dddac3 was carried out on the Monero network on 2014-07-31 18:35:50. The transaction has 3089200 confirmations. Total output fee is 0.005938856620 XMR.

Timestamp: 1406831750 Timestamp [UTC]: 2014-07-31 18:35:50 Age [y:d:h:m:s]: 10:054:22:41:54
Block: 153266 Fee (per_kB): 0.005938856620 (0.000484959265) Tx size: 12.2461 kB
Tx version: 1 No of confirmations: 3089200 RingCT/type: no
Extra: 0221009b64e1213ca95c0cb3407ad24c84500f68e53a16d6aa391c91786653ab51cb260199deb3e50943e341acf1ce58f9c89cb8d03ce67be81bdf9d371bd99ad6fbde5b

1 output(s) for total of 5.000000000000 xmr

stealth address amount amount idx tag
00: dd6a93d121cb929c57cdbe7f0d40bc5cc0e4558daf9e75fa68ad80f831a29dab 5.000000000000 81999 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



119 inputs(s) for total of 4.804254964376 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 238c69ae55b67b214f225ad16fdafe173cfa26675033d3ccd9d0058823230a62 amount: 0.003755245392
ring members blk
- 00: 336ef25c7e151033b22df84b44c2bc62895c47f782f7b17860f6642043f2aef0 00087603
key image 01: f178c65bfc53df803581bbe345f285c9464e51cd589809e1a7791710c594e080 amount: 1.000000000000
ring members blk
- 00: a8730c88b85464488ee6f2cca98ffcb8d95239d1717dd3c7df3674e0ce980c77 00153240
key image 02: 444b8583d2fd711f9ea9413fc6462808064bab51364b1e12023286a9863b2761 amount: 0.700000000000
ring members blk
- 00: aff7c0300bce57ae28214fd86918dff003f1e61f8df51b0982fa9418c8686211 00152423
key image 03: 7d17a943a3fc99b2b41b8c4906955f46a869636bbc4749f5a7100d076af9b3d6 amount: 0.700000000000
ring members blk
- 00: d5199421ada2fd480859ef98e30d55df917ea38e516905604002f6dc70d378e0 00152290
key image 04: 13d42e13cdb4b96611cf45538eab8faa1c87ddd98d87c2d944ef13d2c409cdd0 amount: 0.700000000000
ring members blk
- 00: 84d6e5891af21eae75c28452dc34b90e6b113883265efeb7e2dda0bc7ee16545 00152619
key image 05: 92f7a0a4439edbd9d14f61759f9cb7cc652bc9ee6ecd235526d1e3354ed9d601 amount: 0.600000000000
ring members blk
- 00: 048bccdcf9df2ef2aaec622acead420a94e712d4ce00b47dc1cfabc8acff76b8 00152504
key image 06: 5f1f2fb83c11320a2711e7a5c089e037e51dc4658b24b9aceed7a812dc16360e amount: 0.100000000000
ring members blk
- 00: 435bad70e90dcacb4e29380978dc83ae48f7215fdbcb100ba5d1a5fb71f4d9fd 00153240
key image 07: 0fb9e0c5d16775f4f57140a6bd7e7c0aca59a7407ad69385cc638ac8a04f8d52 amount: 1.000000000000
ring members blk
- 00: e97abb9b4e3779ab35cca0ea41286ed5637dfabe58b623e95fb191c009978520 00151798
key image 08: dfd5362b57f3aceeb2a9ffb73c15730d2defd94e893fd86c42a9e88eee970fa5 amount: 0.000100000000
ring members blk
- 00: 03e04d2c55f900add81bad6a58ae4430b58d39925515f596c13dbccace0bae97 00055342
key image 09: 84a13f6f3a9116ade1567879b114a9e797c4754b59b932a5580c151bf8b0ce9e amount: 0.000199718984
ring members blk
- 00: 0a6912137d9542a13f9f665ba39f4b35cd997618d8b43e110216329703073248 00087375
key image 10: 7f6a2d447e8318351f728dcaac41fcadb6eb285b64de0c2b42a87585d2a4c83d amount: 0.000200000000
ring members blk
- 00: 75739f029648ffc2e9ef97643b43dd337d48abe6c898b8ec10f12a8d30fe5aed 00054395
More details
source code | moneroexplorer