Monero Transaction bec4b2e0715e5fad8628568ae672eae2253859b1c60ee84cf53a7657e9d10750

Autorefresh is OFF

Tx hash: bec4b2e0715e5fad8628568ae672eae2253859b1c60ee84cf53a7657e9d10750

Tx prefix hash: 5863fbaf068cef6d43e4c46780c818f684a243341f0c318a650d9491d1a5fb42
Tx public key: 19954443b75f9e8b64dc4198fd5277e2c3208551b74e746051ac2db61df852a0

Transaction bec4b2e0715e5fad8628568ae672eae2253859b1c60ee84cf53a7657e9d10750 was carried out on the Monero network on 2014-07-11 20:06:20. The transaction has 3156516 confirmations. Total output fee is 0.009950157169 XMR.

Timestamp: 1405109180 Timestamp [UTC]: 2014-07-11 20:06:20 Age [y:d:h:m:s]: 10:128:09:35:00
Block: 124449 Fee (per_kB): 0.009950157169 (0.031741311343) Tx size: 0.3135 kB
Tx version: 1 No of confirmations: 3156516 RingCT/type: no
Extra: 0119954443b75f9e8b64dc4198fd5277e2c3208551b74e746051ac2db61df852a0

2 output(s) for total of 0.010050000000 xmr

stealth address amount amount idx tag
00: 8bbe2180f526c0a782c52416cb1f13e21fd2a2f53e450a1e8801603838b835f0 0.000050000000 35064 of 58904 -
01: 588595bd0bd3150b426c2ccbb70ee5669817384d54b9e9688934e4eba598908c 0.010000000000 312324 of 502466 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 11:12:06 till 2014-07-05 20:35:29; resolution: 0.14 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.020000157169 xmr

key image 00: d45a2e98bc027ba79689b01985047f956c59cee19c309fc93a95e258fa242c20 amount: 0.000000157169
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2cd44b1bf7f44e0c0b06bd9d15e05eafb91e6974086f59b20b2e866cd8df507e 00081973 1 3/177 2014-06-12 12:12:06 10:157:17:29:14
key image 01: 9180edfe007066c6ee7fad8db395eeba06dfe09c496112ca5c39c20870f1fabe amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0144b29a6f7048e90ae77d2d68d6176adab1348beabf3d5ae4e009fba8ce67d7 00115876 1 1/2 2014-07-05 19:35:29 10:134:10:05:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 157169, "key_offsets": [ 0 ], "k_image": "d45a2e98bc027ba79689b01985047f956c59cee19c309fc93a95e258fa242c20" } }, { "key": { "amount": 20000000000, "key_offsets": [ 196516 ], "k_image": "9180edfe007066c6ee7fad8db395eeba06dfe09c496112ca5c39c20870f1fabe" } } ], "vout": [ { "amount": 50000000, "target": { "key": "8bbe2180f526c0a782c52416cb1f13e21fd2a2f53e450a1e8801603838b835f0" } }, { "amount": 10000000000, "target": { "key": "588595bd0bd3150b426c2ccbb70ee5669817384d54b9e9688934e4eba598908c" } } ], "extra": [ 1, 25, 149, 68, 67, 183, 95, 158, 139, 100, 220, 65, 152, 253, 82, 119, 226, 195, 32, 133, 81, 183, 78, 116, 96, 81, 172, 45, 182, 29, 248, 82, 160 ], "signatures": [ "e9eed0864b1d57f50e76b0ebfed6ebe2885349bd182b698377bc7dcaebb0890d0adda5b6c99108e18c2cb15dacf8cb3309c7e08ca775bba5ede8885046eff40f", "36ff374138bbb516cf3b2933642f1086ffc0ebe0079e07bd167a9e2d77737c003c4cd6a2e027ac3c9ccaf90e355d896492337267b88ad4d1bf1a48da27324e0c"] }


Less details
source code | moneroexplorer