Monero Transaction bdbf48d9dc66095af6776e332ff3ac73e770dddfe43c113399f180025d722c72

Autorefresh is OFF

Tx hash: bdbf48d9dc66095af6776e332ff3ac73e770dddfe43c113399f180025d722c72

Tx prefix hash: 81689f5452852e8fbac3375135c7d0c6d389ec6c3aa4909c9565c043ca2b8a82
Tx public key: 836ecd7ae98cf62672604cf2c9b36447e1b1a83aced754c06aa4d86a27818a55
Payment id: 06255b249788deb98d169a6179a3be76de86e0be6f6c9f80f81266d19a8d3fc4

Transaction bdbf48d9dc66095af6776e332ff3ac73e770dddfe43c113399f180025d722c72 was carried out on the Monero network on 2014-07-20 04:53:49. The transaction has 3106137 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405832029 Timestamp [UTC]: 2014-07-20 04:53:49 Age [y:d:h:m:s]: 10:066:20:49:59
Block: 136589 Fee (per_kB): 0.010000000000 (0.016623376623) Tx size: 0.6016 kB
Tx version: 1 No of confirmations: 3106137 RingCT/type: no
Extra: 02210006255b249788deb98d169a6179a3be76de86e0be6f6c9f80f81266d19a8d3fc401836ecd7ae98cf62672604cf2c9b36447e1b1a83aced754c06aa4d86a27818a55

3 output(s) for total of 1.920000000000 xmr

stealth address amount amount idx tag
00: a7af394693741446007c3780f38230954761ce3e950c48e0fac4d51da0b5a982 0.020000000000 200983 of 381490 -
01: 57d054eab765956f71f12b6d16789c67e4ab4f9f6b156ceb4382ff6af0474578 0.900000000000 59643 of 454894 -
02: 73feeabdeb6e9f61d3b0c8f97f950fbc93c5723a9199f78c127cc1c9016716b0 1.000000000000 117709 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-19 08:49:11 till 2014-07-19 22:11:54; resolution: 0.00 days)

  • |_______________________________________________________*__________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |_______________________________________________________*__________________________________________________________________________________________________________________|
  • |_____________*____________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 1.930000000000 xmr

key image 00: 7e115f0c87469bfdc2c735cadbbd8d7ae8e1b909c8193b2e7cee06388c11d48b amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0d266fbee3ee3a9c4850860ededf79aed7b6f6f15155b0ab0a326edfe41a4f37 00135622 1 85/56 2014-07-19 13:10:08 10:067:12:33:40
key image 01: ee6b8f847d06166872f2a7c3691078e7c9a0d8213a606e3b79c747bbae3397de amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c7c277b978f8fc66a1bc156631090da5cc0a4443df5ecd4b59f63fad2d7fe57e 00136111 1 13/44 2014-07-19 21:11:54 10:067:04:31:54
key image 02: 6d3d2ff51c0b0a2aa67a01e4551dc3f15068d8eb21353b64cb4b59e1c76c7592 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9b46e3ae4c5b883cd1db816877d6a6d058f42b7a9a1b04deca5f3b7ab922cf38 00135622 1 85/56 2014-07-19 13:10:08 10:067:12:33:40
key image 03: ab3c5130119736766e1b53cc7fbfbdc610feff3ba94a7cc44e77b75efc0cc70b amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8800fea2ee5abc5f860036b3584d0c7286a1c7fa0c10686a3c39cf5a771de592 00135415 1 3/3 2014-07-19 09:49:11 10:067:15:54:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 115550 ], "k_image": "7e115f0c87469bfdc2c735cadbbd8d7ae8e1b909c8193b2e7cee06388c11d48b" } }, { "key": { "amount": 500000000000, "key_offsets": [ 141889 ], "k_image": "ee6b8f847d06166872f2a7c3691078e7c9a0d8213a606e3b79c747bbae3397de" } }, { "key": { "amount": 400000000000, "key_offsets": [ 94718 ], "k_image": "6d3d2ff51c0b0a2aa67a01e4551dc3f15068d8eb21353b64cb4b59e1c76c7592" } }, { "key": { "amount": 30000000000, "key_offsets": [ 149645 ], "k_image": "ab3c5130119736766e1b53cc7fbfbdc610feff3ba94a7cc44e77b75efc0cc70b" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "a7af394693741446007c3780f38230954761ce3e950c48e0fac4d51da0b5a982" } }, { "amount": 900000000000, "target": { "key": "57d054eab765956f71f12b6d16789c67e4ab4f9f6b156ceb4382ff6af0474578" } }, { "amount": 1000000000000, "target": { "key": "73feeabdeb6e9f61d3b0c8f97f950fbc93c5723a9199f78c127cc1c9016716b0" } } ], "extra": [ 2, 33, 0, 6, 37, 91, 36, 151, 136, 222, 185, 141, 22, 154, 97, 121, 163, 190, 118, 222, 134, 224, 190, 111, 108, 159, 128, 248, 18, 102, 209, 154, 141, 63, 196, 1, 131, 110, 205, 122, 233, 140, 246, 38, 114, 96, 76, 242, 201, 179, 100, 71, 225, 177, 168, 58, 206, 215, 84, 192, 106, 164, 216, 106, 39, 129, 138, 85 ], "signatures": [ "8327a634a4190654f4d6419f41e4cbf4562b396413e0021c5f04263dc32cb20ca7d3b0a0a32b1c31bf2f49ca9e3c60ba2fb43bdca0b296a35fefe28731c95506", "0150b7b631cae6b0cf6de1d64e170a005d4345d3da59416079b84d576e0fdc055491efed236d4f7057f63749b472d284aeb378f147a14a65c571ff9d8ce3960f", "58eae8b219d3deb41000350554242a8c8589fca2726dfccd5463cee40b291507a35d3ae29f45525bcf24bdeb02a2a22057a761a155f66e9c93aaded657f5270f", "c3ef3c7264b3bc01b48e956c1fd19ca436f879330f66a1fcdcf092f1c32c330ea0e6e64d270976ba8db882b0f74da2b7b55afc6aa060ffb8248f8415127b120d"] }


Less details
source code | moneroexplorer