Monero Transaction bdcdf380e273d2c9199077e81ca0003d2922ff3542f3e15e63bcf8e30df643da

Autorefresh is OFF

Tx hash: bdcdf380e273d2c9199077e81ca0003d2922ff3542f3e15e63bcf8e30df643da

Tx prefix hash: fdcc3d164c84dbff597b8741227ccd36f3ca359621e876c3a79385fc9169da80
Tx public key: 4aa756cca978c9d36b09d232ca47499c601df05e57363eb97e1d2ecb020dfcba
Payment id: a2645808348aad67b4ad7c7355e4594e710ce2c28bae2b38a07eede6bbf06d29

Transaction bdcdf380e273d2c9199077e81ca0003d2922ff3542f3e15e63bcf8e30df643da was carried out on the Monero network on 2016-03-20 23:14:08. The transaction has 2299163 confirmations. Total output fee is 0.013978780000 XMR.

Timestamp: 1458515648 Timestamp [UTC]: 2016-03-20 23:14:08 Age [y:d:h:m:s]: 08:273:23:49:44
Block: 1006073 Fee (per_kB): 0.013978780000 (0.024302666757) Tx size: 0.5752 kB
Tx version: 1 No of confirmations: 2299163 RingCT/type: no
Extra: 022100a2645808348aad67b4ad7c7355e4594e710ce2c28bae2b38a07eede6bbf06d29014aa756cca978c9d36b09d232ca47499c601df05e57363eb97e1d2ecb020dfcba

5 output(s) for total of 30.290000000000 xmr

stealth address amount amount idx tag
00: c9c939e3c99f005c3775b839f15224d19a24a43ff4c5d8f823482827e2902c67 0.090000000000 225839 of 317822 -
01: 65e6ea5f7f0bad1e23180f1648fa23ec5e3b43224735edccc905a2258fb15e6a 0.200000000000 1097703 of 1272211 -
02: 244e28f91804c01a35bfa4c5a8be917b54d17229c145e8ba0fd065d88e898735 1.000000000000 692736 of 874630 -
03: 7bd85496df3bef930eada7793c801aa678ffe425590396a7f71e199cce2c2e11 9.000000000000 177281 of 274259 -
04: cdda6b5228aa5542760bfeb6baa6d67652fa16807ab24f6792e5a0b8861dabe6 20.000000000000 51024 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-05-13 18:02:43 till 2015-08-09 16:51:53; resolution: 0.52 days)

  • |________________________________________________________________________*_________________________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 30.303978780000 xmr

key image 00: 4f7e03fa4b8409e0879e15bebc2f841c75bea3ffd11bae3dd54256118a5df28a amount: 0.003978780000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fdc9fabe59b3619aa4b65967923c86d098c83551b5f547b7a92aaa8e31af3c48 00615163 1 25/9 2015-06-19 18:23:10 09:184:04:40:42
key image 01: 288a279dd8b3ada0b9280a02176edf2492ceddc15d83b07f57fd9688dc72cab8 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 209413867a2055e5b2934b75e20c608b471cbf0ea135bcf4b1809d8e6efc06c5 00562299 1 19/83 2015-05-13 19:02:43 09:221:04:01:09
key image 02: 81671881203f6f77104830971713f11f2a14068b161706d9c27b120b9ac262fe amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7ab015ba8e635776c22e11e0960bdb06c0a63037428b187fd7400cd4146964c1 00687904 1 26/11 2015-08-09 15:51:53 09:133:07:11:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3978780000, "key_offsets": [ 0 ], "k_image": "4f7e03fa4b8409e0879e15bebc2f841c75bea3ffd11bae3dd54256118a5df28a" } }, { "key": { "amount": 300000000000, "key_offsets": [ 552189 ], "k_image": "288a279dd8b3ada0b9280a02176edf2492ceddc15d83b07f57fd9688dc72cab8" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 22225 ], "k_image": "81671881203f6f77104830971713f11f2a14068b161706d9c27b120b9ac262fe" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "c9c939e3c99f005c3775b839f15224d19a24a43ff4c5d8f823482827e2902c67" } }, { "amount": 200000000000, "target": { "key": "65e6ea5f7f0bad1e23180f1648fa23ec5e3b43224735edccc905a2258fb15e6a" } }, { "amount": 1000000000000, "target": { "key": "244e28f91804c01a35bfa4c5a8be917b54d17229c145e8ba0fd065d88e898735" } }, { "amount": 9000000000000, "target": { "key": "7bd85496df3bef930eada7793c801aa678ffe425590396a7f71e199cce2c2e11" } }, { "amount": 20000000000000, "target": { "key": "cdda6b5228aa5542760bfeb6baa6d67652fa16807ab24f6792e5a0b8861dabe6" } } ], "extra": [ 2, 33, 0, 162, 100, 88, 8, 52, 138, 173, 103, 180, 173, 124, 115, 85, 228, 89, 78, 113, 12, 226, 194, 139, 174, 43, 56, 160, 126, 237, 230, 187, 240, 109, 41, 1, 74, 167, 86, 204, 169, 120, 201, 211, 107, 9, 210, 50, 202, 71, 73, 156, 96, 29, 240, 94, 87, 54, 62, 185, 126, 29, 46, 203, 2, 13, 252, 186 ], "signatures": [ "73564bf727bf3c03edaaaa408318a0b88158b7b2b3bc6738df0029eda013010c1ccb1af0863ce9900b012e7fcd2065400a8208773b69589061fb7006b98ea30b", "55318f32dcd65792b6db5c671a7825a5f03800007b4fcf5459091f839404240d65fe5ea5d3a508c2441c6f53f50e61ed688ff91b47a18ed1e9ff2c44ee4a0a03", "732ab845806529b671c1661d3e33bad7824856cc4158c90c9132efc4112aa204e192be4e4b13ba1f9ad8ab178523107c5ee9149fb3f5475b380301cb28ac4000"] }


Less details
source code | moneroexplorer