Monero Transaction bdfbb0a41b34a1bf300f5d439c0ed6e23ea9b94bba36ac734ec360e64b990e8b

Autorefresh is OFF

Tx hash: bdfbb0a41b34a1bf300f5d439c0ed6e23ea9b94bba36ac734ec360e64b990e8b

Tx public key: a9422c4e8171ec8056971ea8f114c647cfa22c28ddb0910e519e4a0d2cc72658
Payment id (encrypted): 0505dc5f1a0084c0

Transaction bdfbb0a41b34a1bf300f5d439c0ed6e23ea9b94bba36ac734ec360e64b990e8b was carried out on the Monero network on 2020-07-12 03:37:30. The transaction has 1153387 confirmations. Total output fee is 0.000027120000 XMR.

Timestamp: 1594525050 Timestamp [UTC]: 2020-07-12 03:37:30 Age [y:d:h:m:s]: 04:143:14:52:20
Block: 2140273 Fee (per_kB): 0.000027120000 (0.000010660607) Tx size: 2.5439 kB
Tx version: 2 No of confirmations: 1153387 RingCT/type: yes/4
Extra: 01a9422c4e8171ec8056971ea8f114c647cfa22c28ddb0910e519e4a0d2cc726580209010505dc5f1a0084c0

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 1c32a9a31bdb28da4cc01e7863b15cd7cbc84780c0ef6556cd94ab40f0b7e0f8 ? 18941387 of 120613772 -
01: 3b5a7afc549cfb040e5ef1192fc29555643d4213b8a836a30347fcb62c0e8c7a ? 18941388 of 120613772 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: bd2533c0248d3476d25bc7507b3014cae8574f828d2bc71d224ef0854ca70029 amount: ?
ring members blk
- 00: 6cbe6c927533ba03668fae4f5d05945246a4ba5c50eb6611a3c3b1e76f2752ad 02109739
- 01: f3956b8a71947d918d78bf6718433036c035b53e8793fdc2ec8e795d3269add9 02122077
- 02: 08f371e309ee5cb7161bae8da246c7332cc3e9fd546f6245e894177fc855c558 02122787
- 03: f9647db179678a02398d725f331bb8256ba559789c2efe7431209fdb2e850555 02134146
- 04: c10c2563289c8b47c9bb293074ee42047973ea5b78ad5dd421049f7750ce855f 02138318
- 05: 72aee652716104ae026db0a1c1b6e6569690d436027b4a30d10cd5c307133c5c 02140041
- 06: 828933712726162bb76e5abd20894bbd4048814df2185035a282d943e860d70a 02140108
- 07: 9e912f66c6cf7997c475bf21b1c216ad8247683ada6f948f02f859de17aed9a9 02140122
- 08: 5c0d46950c940bf34a692f1c63439fcaac382e3128ad5aea1751591673d5fd06 02140146
- 09: b25bf04133e069b8d54ea96385f493f2bcfdd68c46f4b5c7e1b9db4148686b33 02140174
- 10: b04c7e2a6d1f3c11bd86fba81b8efb823cb1623d59b841f2951e2b0dc49f1177 02140236
key image 01: 71de174a9f54c6c021440bd06e1a658190bc1b7fac1660eaffffe33382126961 amount: ?
ring members blk
- 00: df7d285e8c1a772b04a026149567330e6b9df2cbd8965605cec359663b59f124 02008690
- 01: 30eb60d62f403877ee910ce763757b2798b9dfeb9d662698fcfa97812e106c3e 02095689
- 02: 3507908f15a7ff450135ce5adf96f3951b2a8b075c9fd3c0afea1e6d79a1dc01 02122735
- 03: 3172aa3ee0ff320dcde9a16da0386d3a03975006331cc45414b342b4d67a85ae 02139267
- 04: bf39f263673212241fc35d24571264963b3d92bce31ceadc92a2d74a717c7607 02139368
- 05: 06f6256fea0ba296eb5ef80dd85278a9879564cacd24b447a10518ccd7a94c09 02139962
- 06: 7d71ec3418650fdfe189b8bb723dcf921dfa009c820fccd65def4e8eb7ec9762 02140081
- 07: ca0719ce3482d570d0afecf72e70301b2503ebb9373c1641a7530c454c8081f0 02140187
- 08: 0fa1a6ebbba0952e6495c1ddb1098b63fdcd67c33f03ef0212d013f17e4d4401 02140207
- 09: 83e3e40066a4afb908b0a39d3ce04513edf80169ca35b7142b4c813b10e05aba 02140226
- 10: 79c7433b30479e43310b63f0def8cf11882f7df5663fb7ed61c3da2a4ea397b0 02140240
More details
source code | moneroexplorer