Monero Transaction bd70f954b83ca15cb13efb52bb1aa0eeb0f10d46b2d494cc125b377a9ccc11b8

Autorefresh is OFF

Tx hash: bd70f954b83ca15cb13efb52bb1aa0eeb0f10d46b2d494cc125b377a9ccc11b8

Tx public key: b2e456fd87e39d1c7555cee3c38a86e87dc68ce86d58f137418ffac51d38ee13

Transaction bd70f954b83ca15cb13efb52bb1aa0eeb0f10d46b2d494cc125b377a9ccc11b8 was carried out on the Monero network on 2016-06-05 18:12:03. The transaction has 2232646 confirmations. Total output fee is 0.037509210000 XMR.

Timestamp: 1465150323 Timestamp [UTC]: 2016-06-05 18:12:03 Age [y:d:h:m:s]: 08:183:23:20:22
Block: 1063134 Fee (per_kB): 0.037509210000 (0.028578445714) Tx size: 1.3125 kB
Tx version: 1 No of confirmations: 2232646 RingCT/type: no
Extra: 01b2e456fd87e39d1c7555cee3c38a86e87dc68ce86d58f137418ffac51d38ee13

9 output(s) for total of 12.902490790000 xmr

stealth address amount amount idx tag
00: bc5deec3bd3df4ba41704c057671657b8226c20a2ad422ad1e95b24bf4c79205 0.000000090000 3044 of 23499 -
01: 923f6e4f86318174261fe3bcbcf64e4e4a4479f38d925479f03b91ffb702b12e 0.000000700000 2651 of 22578 -
02: f2f12898547fb6e345a979afc869312757a24eacb9725b259b39023048f5079e 0.000090000000 39980 of 61123 -
03: 81310c1674fb026c99641711933f8f6e55c2c8bc1e17d1873537c07af028e497 0.000400000000 42744 of 77134 -
04: f77de5854193038e56b0f1304198e1eb58daacc9bd12103bc846da6e7ec83e49 0.002000000000 50160 of 95915 -
05: de80803d4956b8564b3aabc9fd81694bedea714b2885d9e0eaa5ee69b4dce4a7 0.100000000000 889620 of 982315 -
06: 86026d6e6a9f89f323bea7d8c5196bebea5c73b42eb064904691850b7845a106 0.800000000000 416751 of 489955 -
07: a5497cc030dc55ba2a2aba4037a655a15174142f86c89ee5d3c2e37ec667d19e 2.000000000000 370911 of 434057 -
08: c6db9c73e81dea4ff671c216f15a154b1c83b806ab4ec811aef8f67a77e6231e 10.000000000000 774132 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 12.940000000000 xmr

key image 00: 7d5ad6587cd36380849de9392fd1611e75e48b09f96237dad4450ead7cacc05d amount: 10.000000000000
ring members blk
- 00: 1563eb121ed5d7ae6a50b99611193a91bde16200a0f4365ff13b963e6dc9e6bc 00446484
- 01: 59c4519315b9a5bf1eb0cc3ee809dcc965780ff894a04be3d514261489e5eec6 00448530
- 02: 579aaf2f005ad651b2f9c585d546dcf4def65505873d473d264808ea429e577b 01060940
key image 01: 8e18df34a03eab791a84f278287ce98aa5dcf6ae3072d0bf144148139277cff8 amount: 0.040000000000
ring members blk
- 00: 41fed9ce5d31783a2b27a826c61a12bf0e9bc532abf6185b336e700fc95e9517 00176041
- 01: 02179e5e9ef631273799994a8b252c204fcb20e4bbb88ad079046e43480c6aa9 00444976
- 02: d24b120fdea6ae88acafb840a8b1796e2319aad24911faed59052013e5a82583 01059697
key image 02: 776eb0aebca1cbd4b31f67a5e71136fbae261771f416c99a05cafab77edfc448 amount: 2.000000000000
ring members blk
- 00: a536bf2ebdd3cbdafa1e9ad590c12f5163f33f614e9276cfa52bc107e572c739 00126815
- 01: 1dbdd99f17ae628f9d41fa71d16b7c996eb12ba7901ffa23cb6773f603841bfa 00871462
- 02: 0b40aa5ec2e5d3fd4c8f8802a43816353bbafa40e690158678d644aa2422ad81 01061020
key image 03: 218da8109a918aff641bc00073565c9f90f9e7185c51e03684e3600f41c95b2f amount: 0.900000000000
ring members blk
- 00: 7e88f619ddd2348e9f1e862c98d14e76943bdb95f6f5dc0d4e9961c9afdd8daa 00226374
- 01: 2277971977d06033833fa78b72b9424b496af0a076c11f38411cfaffc6b31479 00698574
- 02: 96ee36e16ef46c6842ef2dd828ba8e3e9e8b107bca82116d8acbcda050e6b252 01059697
More details
source code | moneroexplorer