Monero Transaction bdb3a93fd5b40ef5c43e805b6ff2867a302e6a2e254b59b59e03282823ac00fe

Autorefresh is OFF

Tx hash: bdb3a93fd5b40ef5c43e805b6ff2867a302e6a2e254b59b59e03282823ac00fe

Tx prefix hash: 8094fb089ba1da2376a90cf17d04a3bfe9ffedeea93eeffb567652d0f022b0c4
Tx public key: c101924b6feaa3a981e52257a136acaafa38bed3ba6bb206793666b3e7eef8fa

Transaction bdb3a93fd5b40ef5c43e805b6ff2867a302e6a2e254b59b59e03282823ac00fe was carried out on the Monero network on 2014-07-25 02:51:27. The transaction has 3134722 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1406256687 Timestamp [UTC]: 2014-07-25 02:51:27 Age [y:d:h:m:s]: 10:111:10:44:59
Block: 143638 Fee (per_kB): 0.005000000000 (0.013875338753) Tx size: 0.3604 kB
Tx version: 1 No of confirmations: 3134722 RingCT/type: no
Extra: 01c101924b6feaa3a981e52257a136acaafa38bed3ba6bb206793666b3e7eef8fa

3 output(s) for total of 5.000000000000 xmr

stealth address amount amount idx tag
00: 0554ef638e50e1b152f37efa5c86e4f9580d1e6298fd12ef12ceefae2903aad6 0.400000000000 112114 of 688584 -
01: 22c96a056273ba3efd97dbe132ac339c701b83141236002d75b19f00333fbe77 0.600000000000 106910 of 650760 -
02: d19a65bd0c98a68a9598f41a292751511f931e99d6e04e4892fca7181ef2c433 4.000000000000 27416 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-24 21:10:58 till 2014-07-24 23:18:51; resolution: 0.00 days)

  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |__________________________________________________________________________________________*_______________________________________________________________________________|

2 inputs(s) for total of 5.005000000000 xmr

key image 00: 539664e591a8fa6b759b267415e9f20e68779069e544475cf44633d554d995c5 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dca5b0ce8a185c6eecc4a3610d89f836b08ea9998b5fc66fc94573f5872cdc7c 00143373 1 2/5 2014-07-24 22:10:58 10:111:15:25:28
key image 01: 57e25711c7b1e5858273af642a21e6df861440974bb150c12422d273722d8e9f amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e1c98d6c3ff1b15faab210802db64313f636c34cf028729705707cc3abefedd6 00143379 0 0/6 2014-07-24 22:18:51 10:111:15:17:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 194384 ], "k_image": "539664e591a8fa6b759b267415e9f20e68779069e544475cf44633d554d995c5" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 70062 ], "k_image": "57e25711c7b1e5858273af642a21e6df861440974bb150c12422d273722d8e9f" } } ], "vout": [ { "amount": 400000000000, "target": { "key": "0554ef638e50e1b152f37efa5c86e4f9580d1e6298fd12ef12ceefae2903aad6" } }, { "amount": 600000000000, "target": { "key": "22c96a056273ba3efd97dbe132ac339c701b83141236002d75b19f00333fbe77" } }, { "amount": 4000000000000, "target": { "key": "d19a65bd0c98a68a9598f41a292751511f931e99d6e04e4892fca7181ef2c433" } } ], "extra": [ 1, 193, 1, 146, 75, 111, 234, 163, 169, 129, 229, 34, 87, 161, 54, 172, 170, 250, 56, 190, 211, 186, 107, 178, 6, 121, 54, 102, 179, 231, 238, 248, 250 ], "signatures": [ "fa167300bc282ed90c1a6b14dac884485d51457349d0dd6e9214d7e2e6f8b90fc144bf518f7e20c55c101dea7ea2958eca14696efbe41e2bbece0ea22d187904", "3575ee04568f2abf22881007370f9c74ff479b4fca8a3dddeab5af9513dd360e3b60bba6471d0cee65f0eb4d3e3fd8a785f0b6c36e542f98f1452c2c705f930c"] }


Less details
source code | moneroexplorer