Monero Transaction bf02b7896aaa354f8580f0cc8e8bd8092933849db6c8a2a919b962554a5f76ff

Autorefresh is OFF

Tx hash: bf02b7896aaa354f8580f0cc8e8bd8092933849db6c8a2a919b962554a5f76ff

Tx prefix hash: d4e757dcdc3d6042c08ad811d2a8ed2776a1388806bc500b788c0a75331bf0fa
Tx public key: 5336a00126824f54308d094786f33d55c4d33fb44d71fa39154a80c61190cc47
Payment id: f56ea1bf1f6aa0d0c10953ba3a91bb1fe35428d466d39f84eb51048a2159f803

Transaction bf02b7896aaa354f8580f0cc8e8bd8092933849db6c8a2a919b962554a5f76ff was carried out on the Monero network on 2014-10-23 13:09:12. The transaction has 3027812 confirmations. Total output fee is 0.195810884578 XMR.

Timestamp: 1414069752 Timestamp [UTC]: 2014-10-23 13:09:12 Age [y:d:h:m:s]: 10:052:18:26:26
Block: 273355 Fee (per_kB): 0.195810884578 (0.451599877946) Tx size: 0.4336 kB
Tx version: 1 No of confirmations: 3027812 RingCT/type: no
Extra: 022100f56ea1bf1f6aa0d0c10953ba3a91bb1fe35428d466d39f84eb51048a2159f803015336a00126824f54308d094786f33d55c4d33fb44d71fa39154a80c61190cc47

4 output(s) for total of 9.404189115422 xmr

stealth address amount amount idx tag
00: a5a2a7765efc19bcff9c69f1761cf469f92cf7bfbc35c097058d0ad208deb1a2 0.004189115422 0 of 1 -
01: 581aad9d822441fbf124cd59bb6ca11d047ae513f903c7e14c3d637a413a96d8 0.400000000000 250289 of 688584 -
02: 1dbbb89df1d849bb797a63de19d27e3e2c4ef1b7697e52adb4d7f78a59860a3a 4.000000000000 127006 of 237197 -
03: 2f736bf1ba66e87ca440624a95b0936c04681b859707821ef7433e9bc7f41d18 5.000000000000 119920 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-22 17:50:11 till 2014-10-23 02:37:41; resolution: 0.00 days)

  • |____________________*_____________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________*___________________|

2 inputs(s) for total of 9.600000000000 xmr

key image 00: e4beb52b3eca0ee6dc5a58d4b28c6af35226a417e40dd0bf9016034688c7a8a9 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 086ec53f3a1dbed2c7d397e14ba9e15c6dd65e580fa6afc1e577bf5343db5162 00272187 1 1/5 2014-10-22 18:50:11 10:053:12:45:27
key image 01: 20973175829930d3107d74794e50c0a0fc82c9aaff173cfdbb0beeb4c4ccbb63 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ebfd269a53565bda2ca197beae2f0eb421719b08aacec5a8cee193f49c0e1f8f 00272517 1 1/5 2014-10-23 01:37:41 10:053:05:57:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 250584 ], "k_image": "e4beb52b3eca0ee6dc5a58d4b28c6af35226a417e40dd0bf9016034688c7a8a9" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 24159 ], "k_image": "20973175829930d3107d74794e50c0a0fc82c9aaff173cfdbb0beeb4c4ccbb63" } } ], "vout": [ { "amount": 4189115422, "target": { "key": "a5a2a7765efc19bcff9c69f1761cf469f92cf7bfbc35c097058d0ad208deb1a2" } }, { "amount": 400000000000, "target": { "key": "581aad9d822441fbf124cd59bb6ca11d047ae513f903c7e14c3d637a413a96d8" } }, { "amount": 4000000000000, "target": { "key": "1dbbb89df1d849bb797a63de19d27e3e2c4ef1b7697e52adb4d7f78a59860a3a" } }, { "amount": 5000000000000, "target": { "key": "2f736bf1ba66e87ca440624a95b0936c04681b859707821ef7433e9bc7f41d18" } } ], "extra": [ 2, 33, 0, 245, 110, 161, 191, 31, 106, 160, 208, 193, 9, 83, 186, 58, 145, 187, 31, 227, 84, 40, 212, 102, 211, 159, 132, 235, 81, 4, 138, 33, 89, 248, 3, 1, 83, 54, 160, 1, 38, 130, 79, 84, 48, 141, 9, 71, 134, 243, 61, 85, 196, 211, 63, 180, 77, 113, 250, 57, 21, 74, 128, 198, 17, 144, 204, 71 ], "signatures": [ "4e420a023bf18be3e5c71fa52f4e62dc4241dc725089f82404237871b4e80f0a73aeaee65438c3237ddc44363a61c5bf60697a3c26b9c61588b9613208fcf903", "a8216e507ce65e16077f1aa4215dac4524d7f9ab58eeec21571a8d8bcbaab904e988aebbed622a3125e52141cda920476a2f01f4f3906a4a004ebba85a5aa50b"] }


Less details
source code | moneroexplorer