Monero Transaction bdbf148bd566b60a8d2f8cf844df4a504d9af5050bb47a2e5e5263571f4ca59b

Autorefresh is ON (10 s)

Tx hash: bdbf148bd566b60a8d2f8cf844df4a504d9af5050bb47a2e5e5263571f4ca59b

Tx public key: 48165509a6ec702d5f8327e1056d5e0b6c1cde68c96d4ad0d9ec7f365b3b4f2f

Transaction bdbf148bd566b60a8d2f8cf844df4a504d9af5050bb47a2e5e5263571f4ca59b was carried out on the Monero network on 2014-06-16 20:48:44. The transaction has 3205323 confirmations. Total output fee is 0.000001158743 XMR.

Timestamp: 1402951724 Timestamp [UTC]: 2014-06-16 20:48:44 Age [y:d:h:m:s]: 10:170:21:41:26
Block: 88337 Fee (per_kB): 0.000001158743 (0.000001260949) Tx size: 0.9189 kB
Tx version: 1 No of confirmations: 3205323 RingCT/type: no
Extra: 0148165509a6ec702d5f8327e1056d5e0b6c1cde68c96d4ad0d9ec7f365b3b4f2f

10 output(s) for total of 0.017198841257 xmr

stealth address amount amount idx tag
00: dc9289b8829ddeaea0d4e0c8672d1163970e7344afba7ac4634dfacbaba9883f 0.000000841257 0 of 1 -
01: d042bb85ddb1fff3ce9c58ea59de734710634bf5aa71f767b0c833dcc59ab1c1 0.000001000000 18336 of 42360 -
02: 79ce8cc7f09d7233df328f10cbcbd4844caafd997b96b00ce4caff56e7a31211 0.000007000000 18403 of 41473 -
03: fae037e8fe82c774d86c1622e483c4cc33298e7573de585a53f7dfa84b01434f 0.000020000000 35383 of 59482 -
04: e5854017c6248a7ab18bffdc54eae3d085ff8c0f18225f32d57ad578d4f14035 0.000070000000 35051 of 59071 -
05: 0ed23be235bdec8fcf72a1812ebd6614b01588773309fd4ffa4f5b4ba9e57838 0.000400000000 34947 of 77134 -
06: ea21e1aa88b2b1f4df59ce49fd49ee34823e8192ac98743424073dbc2ad61e21 0.000700000000 34602 of 77523 -
07: d492a5c43bfb1cbbb62522e06c0465e06fad23e6c76d34bf9bacd829f50ea2b1 0.002000000000 39273 of 95915 -
08: fa5032128e73486126c177aa7e4ecf7b504efb7bb85572d0338056f2c3aace75 0.004000000000 32909 of 89181 -
09: 65e6ed655f7fd52db6b605b88981a1d27d7b1699918931b02913d6d3197c638f 0.010000000000 258040 of 502466 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 0.017200000000 xmr

key image 00: babd4c3c5995b50bc612bd69bcc3ac39818a17f791cca129a517fa535231ff16 amount: 0.000900000000
ring members blk
- 00: b629d957991c6d0c4ca62f5df4e20617b2ecaf2b97a5abd6ca86a714b261335a 00083116
key image 01: 1862a18c79f2c17e54f7ff3b03fa2835dc0195d8c4dc35c3af52e5ef3eae0330 amount: 0.006000000000
ring members blk
- 00: 9f809d56d94a7be92db62d60c4015a47e7116aa97dee79bd53581f5d638b7fef 00081103
key image 02: 75b3586fb37c980a3cb5f27268a4d2af90aca8fa1a2243ab4f2d5e87c89798ff amount: 0.000500000000
ring members blk
- 00: 68bb4f465c5b967ddef8082609efb2544f967c37ce72c54a2a52c8139a2393e0 00080589
key image 03: 3697aa76179701ad48394a774c643c334f53cd25dbb69864924d130967985afb amount: 0.000800000000
ring members blk
- 00: 033d19965fc321a1e4b92c3a21b9f4224a7415be40294775ae3ff216c79ce26a 00081813
key image 04: ef6faa35a768cb4483e8ddfbe9543c5c2a9d5c91bcc086982cf52271e9601e5d amount: 0.009000000000
ring members blk
- 00: ea702a8f35525920c0ebd2001f94f888229e64d69779232efd5f1aec2858fad8 00083690
More details
source code | moneroexplorer