Monero Transaction bd85b8e1ac9e4b35f1c08ac2fdb07b404a9c86b0de642239500587a2915d5424

Autorefresh is OFF

Tx hash: bd85b8e1ac9e4b35f1c08ac2fdb07b404a9c86b0de642239500587a2915d5424

Tx public key: b448bb7d15f521a312375d646c5b50039419e3f06a235d81cfc40131ef677c80

Transaction bd85b8e1ac9e4b35f1c08ac2fdb07b404a9c86b0de642239500587a2915d5424 was carried out on the Monero network on 2014-06-06 09:12:50. The transaction has 3205247 confirmations. Total output fee is 0.005220000000 XMR.

Timestamp: 1402045970 Timestamp [UTC]: 2014-06-06 09:12:50 Age [y:d:h:m:s]: 10:160:04:43:14
Block: 73122 Fee (per_kB): 0.005220000000 (0.005710769231) Tx size: 0.9141 kB
Tx version: 1 No of confirmations: 3205247 RingCT/type: no
Extra: 01b448bb7d15f521a312375d646c5b50039419e3f06a235d81cfc40131ef677c80

18 output(s) for total of 1.995080000000 xmr

stealth address amount amount idx tag
00: 7f8c579ed68f43946dd6bb094c0d0bdd735b7a33dc146c194eee9c91e9603103 0.000180000000 952 of 2152 -
01: 3347f91d40c29967d00cbfdf5d198e2286b02e57f60c5d97f6c07624d17ebf47 0.000590000000 928 of 2115 -
02: 27f9559ede7ebd8676faafd3ba2ad551590d944d5a678cdf31b481c782fcf742 0.000740000000 908 of 2113 -
03: 7bde943decaed33a03858c9431044c21b407e398ec0c2da7f47490b9e6e5791c 0.000740000000 909 of 2113 -
04: ba5f02d9343b83691cae01de0be71bf719991e61901927fcd4b11373d6baab00 0.001480000000 201 of 429 -
05: 945385e20763e3e39c47514033568113c99b711d78aacf4dc2a6beb253cf2d92 0.001480000000 202 of 429 -
06: fbfcb26c170093b68ebd958dee39c90e09030ee3d3504bf44d2185e95c676a32 0.001480000000 203 of 429 -
07: 4e1a1f0d88abec8a45e301ce56980823732ea19d6e06b976b218e44e82265418 0.001830000000 186 of 401 -
08: e7658dfc288d00e7fcd9caba9074d014cfdeaff67cd3cf3edb813b83184c0215 0.001830000000 187 of 401 -
09: 869c4365c53f5132a5a12edec761bc75c629af07d7f85eafcfdf800628a5e8aa 0.002250000000 176 of 416 -
10: 5cd2eed4db7e8466ffb63016a6e9b3317aef1c76be081efac8f32b0494b0734e 0.002480000000 209 of 440 -
11: 0318de00b5f361eef7e5c65b9fe591e3e336e119af853c820b04876e36dc7b8d 0.006000000000 52554 of 256624 -
12: c11a67c683025c64e9ac8d9b0f2253a69f663be5af388e1bb9991461b9635560 0.007000000000 50335 of 247340 -
13: d7830bd509d231a597349b38c8d55dbe0955747d1fe3b4af6a6f63037c9bfc22 0.007000000000 50336 of 247340 -
14: 8578c38e32d1ebb91893a517b5475c5900e0e50e82e4c65992e8df4b890c0250 0.010000000000 98692 of 502466 -
15: 6c157bc747d75e9f627cbb6b9620cb7f74999d5151633594797614c473908d0f 0.050000000000 31956 of 284521 -
16: 6a9cac4f62f4c501d828e42729dc6e92e546c020f223635e63d858f9a785ff19 0.900000000000 12199 of 454894 -
17: 91b09bf296ae66afae512502e4d90e83b198c393b0997831ff4e9a5449137206 1.000000000000 11624 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 2.000300000000 xmr

key image 00: e4456920a06b110aac49f6c2e82772643798ab5208f0a30ec40301109969d77b amount: 0.000300000000
ring members blk
- 00: 678e2fea1497e9e8d3afc9284fd7fd7c16977b62743c52c8534bec1d5ff2c3bb 00064508
key image 01: ad41a62cd8f40ebfc0726f3643f6e5584bf6f432ee03cc8c2e67af41e60cf338 amount: 2.000000000000
ring members blk
- 00: f6607f3be573c11411afb1f6c42422e4c57acfbc83c6c03644dea94711d870ff 00072735
More details
source code | moneroexplorer