Monero Transaction befa476afb0e1977fd490e7e4b4df4189dde60708d334fe52ddc730757b036aa

Autorefresh is OFF

Tx hash: befa476afb0e1977fd490e7e4b4df4189dde60708d334fe52ddc730757b036aa

Tx prefix hash: 30c90608fcf12093d9b6f866b12d067aae19fddd0ea67bbdec4eb5ab76f05490
Tx public key: 20186cb7556e6397ff16562c460d853b58a48f6feb242061adff86498ff82059
Payment id: d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc

Transaction befa476afb0e1977fd490e7e4b4df4189dde60708d334fe52ddc730757b036aa was carried out on the Monero network on 2014-08-03 20:34:45. The transaction has 3120785 confirmations. Total output fee is 0.005254490000 XMR.

Timestamp: 1407098085 Timestamp [UTC]: 2014-08-03 20:34:45 Age [y:d:h:m:s]: 10:101:20:32:30
Block: 157692 Fee (per_kB): 0.005254490000 (0.005364504247) Tx size: 0.9795 kB
Tx version: 1 No of confirmations: 3120785 RingCT/type: no
Extra: 022100d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc0120186cb7556e6397ff16562c460d853b58a48f6feb242061adff86498ff82059

6 output(s) for total of 10.172745510000 xmr

stealth address amount amount idx tag
00: b3e38f65024b743e71b971144a2e8d585012986d6f53b6a2377f0499e726490f 0.002745510000 0 of 1 -
01: b69fb07fa9fa3fd5826e39eec8f82d74a288fb0e953b7dd2f01cc734f08de2dd 0.070000000000 91405 of 263947 -
02: a74b06ae0ca9f5d0f89d7ff76b5e204c333eae96bba4d19a3f318a1f9f9c7a5a 0.300000000000 142826 of 976536 -
03: f43c3d9e9ffe275d77d355792b7563025bd21435f80a91a3a79bad8765c175cc 0.800000000000 97755 of 489955 -
04: 70cde6c843820c5b5e48a4c2bc50fd55a0106ee7865147f61b3ac9b41f9d8b81 4.000000000000 31978 of 237197 -
05: 007bd4bcd488e4aee614ff6786dc12e86f703ef9432a9b02520fb1915d3bffeb 5.000000000000 87541 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-03 02:00:11 till 2014-08-03 21:22:29; resolution: 0.36 days)

  • |______________________________________________________________________________________*__________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________*_____________________________________________________________________________________________________________________________________________*|
  • |______________________________*__________________________________________________________________________________________________________________________________________*|

4 inputs(s) for total of 10.178000000000 xmr

key image 00: c2f79d210b065ebabd47715e35a2264d7100333466e4ed7676beb6888eb76ae9 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2d65bfb0dd24dd7577ce022cee9a4f8aecee60514f9df6e2bc2bf6f7c155cb23 00113844 1 20/32 2014-07-04 10:43:11 10:132:06:24:04
- 01: 7ff80e5f8181eeb6864b4976b8928a6f1e4945b473c1313407fa9c5f96dc5bfc 00157456 2 8/7 2014-08-03 16:14:36 10:102:00:52:39
key image 01: c44e78d44a54947a745615541388dbd10cd24cb6ce1c006526f55737af083e8e amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 80a06ee931e86c44df844e84814ce639696d80c51369e3d2b79ca0ff0f7c6bf2 00068450 1 28/59 2014-06-03 03:00:11 10:163:14:07:04
- 01: cae4b022a6cc69e2c369ebc5d93df8b9713dee6a7a29ea141c173b2bfc45db2e 00157625 0 0/6 2014-08-03 19:30:21 10:101:21:36:54
key image 02: 20b93ed7c20309fda162490cf16a46736fe15cca60fb593fcf745b2e6f49cb7c amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 44fb98bb71464ab3e359c8ad13e6742b97cf82c2229cb6a00779955862aac019 00082347 1 2/115 2014-06-12 19:01:02 10:153:22:06:13
- 01: 85616ba8f6c81ea3a16d3db0ed2500545ca26c02630d51928486a9faada8e7ea 00157680 2 3/7 2014-08-03 20:22:29 10:101:20:44:46
key image 03: e52a2f8f17b58f77a682fce0c3ef9d04da22aa47396c576189018174ca7c226a amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 05c96a20e4967b065abb0a719bc5205995c55fb6ab4945e17d437a10b9812ca1 00083853 0 0/5 2014-06-13 18:58:27 10:152:22:08:48
- 01: cc101c88c8f683b8fc805faf7a1079655564a35e0e6f91f1f0eef1eb50df1b54 00157266 0 0/5 2014-08-03 13:13:00 10:102:03:54:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 227301, 136336 ], "k_image": "c2f79d210b065ebabd47715e35a2264d7100333466e4ed7676beb6888eb76ae9" } }, { "key": { "amount": 70000000000, "key_offsets": [ 19143, 72209 ], "k_image": "c44e78d44a54947a745615541388dbd10cd24cb6ce1c006526f55737af083e8e" } }, { "key": { "amount": 8000000000, "key_offsets": [ 85536, 76705 ], "k_image": "20b93ed7c20309fda162490cf16a46736fe15cca60fb593fcf745b2e6f49cb7c" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 87435, 92877 ], "k_image": "e52a2f8f17b58f77a682fce0c3ef9d04da22aa47396c576189018174ca7c226a" } } ], "vout": [ { "amount": 2745510000, "target": { "key": "b3e38f65024b743e71b971144a2e8d585012986d6f53b6a2377f0499e726490f" } }, { "amount": 70000000000, "target": { "key": "b69fb07fa9fa3fd5826e39eec8f82d74a288fb0e953b7dd2f01cc734f08de2dd" } }, { "amount": 300000000000, "target": { "key": "a74b06ae0ca9f5d0f89d7ff76b5e204c333eae96bba4d19a3f318a1f9f9c7a5a" } }, { "amount": 800000000000, "target": { "key": "f43c3d9e9ffe275d77d355792b7563025bd21435f80a91a3a79bad8765c175cc" } }, { "amount": 4000000000000, "target": { "key": "70cde6c843820c5b5e48a4c2bc50fd55a0106ee7865147f61b3ac9b41f9d8b81" } }, { "amount": 5000000000000, "target": { "key": "007bd4bcd488e4aee614ff6786dc12e86f703ef9432a9b02520fb1915d3bffeb" } } ], "extra": [ 2, 33, 0, 210, 160, 141, 253, 177, 68, 90, 178, 46, 48, 143, 173, 198, 252, 104, 178, 142, 52, 50, 48, 99, 66, 226, 37, 155, 192, 160, 190, 184, 189, 27, 188, 1, 32, 24, 108, 183, 85, 110, 99, 151, 255, 22, 86, 44, 70, 13, 133, 59, 88, 164, 143, 111, 235, 36, 32, 97, 173, 255, 134, 73, 143, 248, 32, 89 ], "signatures": [ "f47d009a39d614d05a203d877ecf8a3e8b41ef4e7ac533a67520298496b48d0f675e024724c60009f5d800c355b6aeacaa65ee2e23f55d42c62e867ab5040b05bbed3ec506671cf74c8d8185f0f9a99dae0dffaa589674d816455beb5fb23d05177833fe9950743d095f6ff0784946328e13e33e444546a90c5c7b77c204c00d", "c613ffef0136fb935fe4fc1663aeaf30d4bcb4052a9cea1de43f089376599e03c61d1f0552ba479d96c36ba532f20c4b666ccfc560304876e5bb110cb280260d495839842f750083fdab7bf991137c62553215e2a52967e2ca5baac97713430051808e28fd31ef36e832dfdf89a3ec3383ad253c4cf2c8f795eab7a055dbc403", "1c323b2679e33042eea4627e3476eabd1ed2fc8c7d80194ef9591d250da3090695362196b2d07fc80502909597bb12922662491b2d1a42cde0a079523ffb860748618941a193da65f9ce2d0522962857b88a3c5495ca75c1503301a282504905e60def3fe1b4751d334d560cc952e354c1db60af496c94c5f8d9e379fa7ea209", "28e4b571bded146488507a6ee97883e4e03a9aeb14985a973583d37693b9fd08920011e7eead207b9ac17672fd778e699a317895a1914032f36f9cb1b4864f014925cdafc8d2a8b329ba088b7fa0f550994902f9fa0d2e2a580c44b4e4d36e0b3fdc3733dc2b459314597137e22608633c6262c15f4cda962fcda31e124acf00"] }


Less details
source code | moneroexplorer