Monero Transaction bd70224288a5c1bdf33d992c77c47090b089f32784df3abe0e87cbd85a4843ce

Autorefresh is OFF

Tx hash: bd70224288a5c1bdf33d992c77c47090b089f32784df3abe0e87cbd85a4843ce

Tx prefix hash: 9dc6e202aba32d40b2fafd9e9b484f9d20f38bf34efd70bac99d02ed10082336
Tx public key: 9bd29b4fe74ce2c56ab7e837271ca8dce59e43832f14e6f1700975d02cb11f0a
Payment id: 66ca24fce07d55ec65bff8150f0397106d4572e79dbe9c369dc94b198830baa3

Transaction bd70224288a5c1bdf33d992c77c47090b089f32784df3abe0e87cbd85a4843ce was carried out on the Monero network on 2016-09-14 18:54:02. The transaction has 2173870 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1473879242 Timestamp [UTC]: 2016-09-14 18:54:02 Age [y:d:h:m:s]: 08:102:12:47:58
Block: 1135964 Fee (per_kB): 0.010000000000 (0.013617021277) Tx size: 0.7344 kB
Tx version: 1 No of confirmations: 2173870 RingCT/type: no
Extra: 02210066ca24fce07d55ec65bff8150f0397106d4572e79dbe9c369dc94b198830baa3019bd29b4fe74ce2c56ab7e837271ca8dce59e43832f14e6f1700975d02cb11f0a

5 output(s) for total of 11.990000000000 xmr

stealth address amount amount idx tag
00: d0ef7b8ef431de5c042b2085bea34a093b6183ebaa53d67a367522603c45ea69 0.090000000000 255569 of 317822 -
01: 866c12425842aed5822773f0d182ef310eece764bdda7d55dea257073b3edaf6 0.400000000000 613480 of 688584 -
02: dcf6f113a7568385eadca8ad82491a7438b7a1ebc61b20f85101e98b355dc375 0.500000000000 1044491 of 1118624 -
03: 6f6efe83be657fe33b65f9ba889d92505574db444a5b657c7aac1a28783a4149 5.000000000000 226331 of 255089 -
04: 42ead5536ee3979b62fb6e690b33d273fb700a203b4683f23d1d23e34b9f165a 6.000000000000 187489 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-18 13:10:34 till 2016-09-14 19:14:14; resolution: 3.38 days)

  • |______________________________________________________________________________*__________*_______________________________________________________________________________*|
  • |_*________________________________________________________________________________________________________________________*______________________________________________*|

2 inputs(s) for total of 12.000000000000 xmr

key image 00: 24f16b8aacf816d169d9b0761c3fe5395accefdd51d928f053e55a336627e8b5 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a304dc6b5c20049f16136ed6659e778be9d0dfb31c7ddd05789d899ebee75131 00819375 1 4/9 2015-11-10 03:16:55 09:047:04:25:05
- 01: 9bce16acce088e0c0799b01957935a1d9f271f2ff2dba13e1712e512006098be 00868570 4 1/98 2015-12-14 19:16:08 09:012:12:25:52
- 02: e82418aac4c3cc2597052aff3812fb31f2c8fb53cf09eaaf764bd5bde347a4d3 01135946 3 1/4 2016-09-14 18:14:14 08:102:13:27:46
key image 01: bf1d66c592375ddc56866a3a6892571f458cba91f4cd9afb70fc2b5c98b75b52 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ec6cdddab8ae9eb3df859936708cdaa974c8a368bc0f4b4b5dd6e94be159bfb3 00441683 0 0/5 2015-02-18 14:10:34 09:311:17:31:26
- 01: 93f61127d7d64864b60155752314635e24a30d2b97626a0d14f94621c8a71ab9 01018815 0 0/6 2016-04-05 01:45:03 08:265:05:56:57
- 02: 481beff843bbb17b69f53197f2d16b6cd59387c78f3e91baddf5523431cddcba 01135857 0 0/5 2016-09-14 15:08:51 08:102:16:33:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 304560, 5581, 88049 ], "k_image": "24f16b8aacf816d169d9b0761c3fe5395accefdd51d928f053e55a336627e8b5" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 508354, 214229, 142237 ], "k_image": "bf1d66c592375ddc56866a3a6892571f458cba91f4cd9afb70fc2b5c98b75b52" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "d0ef7b8ef431de5c042b2085bea34a093b6183ebaa53d67a367522603c45ea69" } }, { "amount": 400000000000, "target": { "key": "866c12425842aed5822773f0d182ef310eece764bdda7d55dea257073b3edaf6" } }, { "amount": 500000000000, "target": { "key": "dcf6f113a7568385eadca8ad82491a7438b7a1ebc61b20f85101e98b355dc375" } }, { "amount": 5000000000000, "target": { "key": "6f6efe83be657fe33b65f9ba889d92505574db444a5b657c7aac1a28783a4149" } }, { "amount": 6000000000000, "target": { "key": "42ead5536ee3979b62fb6e690b33d273fb700a203b4683f23d1d23e34b9f165a" } } ], "extra": [ 2, 33, 0, 102, 202, 36, 252, 224, 125, 85, 236, 101, 191, 248, 21, 15, 3, 151, 16, 109, 69, 114, 231, 157, 190, 156, 54, 157, 201, 75, 25, 136, 48, 186, 163, 1, 155, 210, 155, 79, 231, 76, 226, 197, 106, 183, 232, 55, 39, 28, 168, 220, 229, 158, 67, 131, 47, 20, 230, 241, 112, 9, 117, 208, 44, 177, 31, 10 ], "signatures": [ "e0fff20e91185f13af67c6a45cdebd384ca0e100913d9e926260924aa398b90704daafaf65f9fc5a9b834297c6b34adde70d162e9b2ab3cae6bd1e7042a9a10ec540b12f4609f586f8cc2d141142525581eb5b662aa26546f0eadca854376002b1338a209b63238f6150a3c214af1a551a93e5a98c2d896b316b08d179c8e00490ad46ecf441598b0805e5a093567a2f76e2c739327350407388c5dcfc2ffd046711f2779e4a507b9b562313dd3c410f592164be840d4513de3e065e00333f04", "e66800b5c64554a045dd91d565476a487c9063bdf2d3bcfac9a7e07e591b0a0e6bc7ac44c86544e5805a9fffc6258ab7a68428b4312d3a4f1b2a8e748cb6a70106a13b0c1fdda68101a582eb4c121e4be92f34bb9e3f996e61739cc97d47e909b684d94bd1d83847bb446be9331f4490990b8d077c8c5ead3c52bb905e3fa9029b25a314ac12d0fe9809e77aa7d2ff50b8141af33c15af6f3658c2eaafba980963564d0ab7274bef86498b323756f429a142d5e6cb27d998e0ad7de8f9f6d304"] }


Less details
source code | moneroexplorer