Monero Transaction bd9f483f8d7310b9d7aeac0b113d73179f1b02277526b0484a24cad2bdc5a7c5

Autorefresh is OFF

Tx hash: bd9f483f8d7310b9d7aeac0b113d73179f1b02277526b0484a24cad2bdc5a7c5

Tx prefix hash: 896a26a305b2b6878a56c50594b34e8531c3777c434ca70114477653511865b3
Tx public key: aa6a557fce66cd881bb654245251babfb0d91f7b3d04fcc83b14474e49a6cbe7
Payment id: 93dc5fb4bbab41a19de2db4b4d364f391260ac5dfe8b411eb054c3f2b1fdf2f0

Transaction bd9f483f8d7310b9d7aeac0b113d73179f1b02277526b0484a24cad2bdc5a7c5 was carried out on the Monero network on 2014-07-28 15:49:40. The transaction has 3092838 confirmations. Total output fee is 0.005606978670 XMR.

Timestamp: 1406562580 Timestamp [UTC]: 2014-07-28 15:49:40 Age [y:d:h:m:s]: 10:056:20:32:11
Block: 148769 Fee (per_kB): 0.005606978670 (0.010534947079) Tx size: 0.5322 kB
Tx version: 1 No of confirmations: 3092838 RingCT/type: no
Extra: 02210093dc5fb4bbab41a19de2db4b4d364f391260ac5dfe8b411eb054c3f2b1fdf2f001aa6a557fce66cd881bb654245251babfb0d91f7b3d04fcc83b14474e49a6cbe7

4 output(s) for total of 0.675000000000 xmr

stealth address amount amount idx tag
00: 7f86879b4efadc099972e70cc9387852e527fd817586b56d40747a452712d418 0.005000000000 196999 of 308584 -
01: f90c6fbfe54caf1598426a7e025b6330e5ad2c6e94af4eace7deaf4f21d2b2e0 0.020000000000 205085 of 381490 -
02: b37e20bb1fe4474987d89ccc7024d42c5a8c29628136df7eafd1912c4489c37a 0.050000000000 110539 of 284520 -
03: d3da95dd16eebc1c6da5caafcd7dd9da2dbdd5dbfd0a1bf99ef586a23692e866 0.600000000000 114572 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-28 14:30:54 till 2014-07-28 16:30:54; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.680606978670 xmr

key image 00: 37dd785a6ecab434b2330fc8eaa5530886f39eb29adbeff399cfd82d59f18c95 amount: 0.000606978670
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 59291351da5a4cc73bc9ea77c2f5163dc8a7246d5707092f124c191b02ef1795 00148751 1 2/7 2014-07-28 15:30:54 10:056:20:50:57
key image 01: 7e2976c267e7fd4b1079eb79a2812003197bac604185ad36049f1eb718aa1f8a amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2c41b112ac20c341eb9c78f6cc3aee70d444935c0d5ec9f712f04ed80e9c077c 00148751 1 2/7 2014-07-28 15:30:54 10:056:20:50:57
key image 02: e104d7d21d15b8fe10f231beb00b65e498546c23b200e6ae8a5143ef0c364f5d amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 29eaa4cffbf8744379b898f2a5e0a67ea7a664502cbc2301c5a9f3067205f0dd 00148751 1 2/7 2014-07-28 15:30:54 10:056:20:50:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 606978670, "key_offsets": [ 0 ], "k_image": "37dd785a6ecab434b2330fc8eaa5530886f39eb29adbeff399cfd82d59f18c95" } }, { "key": { "amount": 80000000000, "key_offsets": [ 83456 ], "k_image": "7e2976c267e7fd4b1079eb79a2812003197bac604185ad36049f1eb718aa1f8a" } }, { "key": { "amount": 600000000000, "key_offsets": [ 114531 ], "k_image": "e104d7d21d15b8fe10f231beb00b65e498546c23b200e6ae8a5143ef0c364f5d" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "7f86879b4efadc099972e70cc9387852e527fd817586b56d40747a452712d418" } }, { "amount": 20000000000, "target": { "key": "f90c6fbfe54caf1598426a7e025b6330e5ad2c6e94af4eace7deaf4f21d2b2e0" } }, { "amount": 50000000000, "target": { "key": "b37e20bb1fe4474987d89ccc7024d42c5a8c29628136df7eafd1912c4489c37a" } }, { "amount": 600000000000, "target": { "key": "d3da95dd16eebc1c6da5caafcd7dd9da2dbdd5dbfd0a1bf99ef586a23692e866" } } ], "extra": [ 2, 33, 0, 147, 220, 95, 180, 187, 171, 65, 161, 157, 226, 219, 75, 77, 54, 79, 57, 18, 96, 172, 93, 254, 139, 65, 30, 176, 84, 195, 242, 177, 253, 242, 240, 1, 170, 106, 85, 127, 206, 102, 205, 136, 27, 182, 84, 36, 82, 81, 186, 191, 176, 217, 31, 123, 61, 4, 252, 200, 59, 20, 71, 78, 73, 166, 203, 231 ], "signatures": [ "08462c4fc8938c55649fe368c28f27be68f4635eb4a898621feb3a3ba521b5064bd1767e771e522974b20f9514a7da79b9db4e840f4587ef33d8b2eac9ab770f", "b216c3a08dc445d2d8e11ca8042e7bd011d2bb097d2313b28555fd3c168c500a3cb958ae03e8c536ad9835270f89b6a64710e7d1d9a65d8add43a6d5c61c2b07", "8629f44548f75b8dd42ea8183b95c011b1488cf6e1d4bb30fc4eb04cfb3aad014a608558a1d809a8f99f667107b1d46824ed0549aafe71b11874eaa7edd02c00"] }


Less details
source code | moneroexplorer