Monero Transaction bf1dc4ecf3b3218fa527a5149b0e4953972addf9410b38d3195ed462239dab84

Autorefresh is OFF

Tx hash: bdee53444ded5476aa1a9aa13d9aa89640ce48a20a29246d341d52aed40847f9

Tx prefix hash: 3e2934acaecfc14e39cfcbdf874518483bd909d88e19f15cd3dd16eb06ea92e5
Tx public key: ebf7f95606b381ca63011d91cd5dc20811d30701a41d296e61913acb59082681
Payment id (encrypted): e3efbd94c3346b59

Transaction bdee53444ded5476aa1a9aa13d9aa89640ce48a20a29246d341d52aed40847f9 was carried out on the Monero network on N/A. The transaction has 0 confirmations. Total output fee is 0.000030720000 XMR.

Timestamp: 0 Timestamp [UTC]: N/A Age [y:d:h:m:s]:
Block: N/A Fee (per_kB): 0.000030720000 (0.000110376421) Tx size: 0.2783 kB
Tx version: 2 No of confirmations: 0 RingCT/type: yes/6
Extra: 01ebf7f95606b381ca63011d91cd5dc20811d30701a41d296e61913acb59082681020901e3efbd94c3346b59

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 0aafe5ea9a6cd4ea992199ec44af89756b57bae0dd8d36a166ea4bdfcd7bbd7d ? N/A of 120183616 <0d>
01: 11f21c59534188aa0132a2ed1c368aceccb36ef64bf2bc06ff19718232cc5905 ? N/A of 120183616 <9d>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2020-09-25 00:38:08 till 2024-11-15 06:44:36; resolution: 8.90 days)

  • |_*_________________________________________________________________________*_________________________________________________________________________________*__________**|

1 input(s) for total of ? xmr

key image 00: 92e0bad45ac3e832c8d6023a992630b20b4b4a3d225e760a266c3afe7e012a74 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f148da20f62f795099642397b3b520fea9256e109ea5903c4d57bb1828576f45 02194088 11 2/2 2020-09-25 01:38:08 04:062:17:29:57
- 01: 112e6ed59e62a3bbb713514bd9fcdbf25f6117f990c5e5d5ca1012fd565ef397 02671213 11 2/2 2022-07-20 06:10:18 02:129:12:57:47
- 02: 20a193514316540671f7e2348f8b61a84f67e3fce3a1c22573369f3dda59086a 03201725 16 1/2 2024-07-27 03:28:10 00:121:15:39:55
- 03: 72380b428b837e6d2fbd3706c8ce3bb25668c8f27bbb8a7ff13bd7ceb9eeb6a1 03271464 16 2/10 2024-11-01 00:32:52 00:024:18:35:13
- 04: f5989e7b4c5a67c127fd0786584c6d9fdc2b0bdd812c298d43af615e1de181c3 03272273 16 1/16 2024-11-02 03:36:48 00:023:15:31:17
- 05: 10a11ebc8be0ba427477c8945d28b9e23253b45efc9f06fa661950e1a221a861 03274822 0 0/1 2024-11-05 15:58:39 00:020:03:09:26
- 06: deab69dcacba51ef94c5bc6065cffccc4af79311824d8ebed3be80cc1d84cd16 03279599 16 1/2 2024-11-12 07:55:27 00:013:11:12:38
- 07: a80191d7ba9b217543cf280168b0d1da621c6c0a7ef55c8129fc71850b5b093a 03280994 16 2/2 2024-11-14 06:52:51 00:011:12:15:14
- 08: ee999c862dcdfa80e7c319635221df85106bde3073ec78c302ff486e07371d24 03280998 16 2/11 2024-11-14 07:07:38 00:011:12:00:27
- 09: 272b3804793e8b09f662a6e25a94c5f1d376d41cc8b89b03c2539cd1c5622ea5 03281153 0 0/648 2024-11-14 11:21:10 00:011:07:46:55
- 10: bfea8a0a4ebaea9d9d8d5c2dc7da0331bf00a786bb1d98af24aac0a265680774 03281342 16 11/12 2024-11-14 17:12:12 00:011:01:55:53
- 11: 9f61df666273534cd57bfe85f6cd8200e510b37ca64022f39e37038e61d8c877 03281346 16 1/2 2024-11-14 17:20:51 00:011:01:47:14
- 12: 2d457bad52c105849c5649dec4e4969aced1ea3000f710d1858e2b156079b726 03281511 16 1/2 2024-11-14 22:42:47 00:010:20:25:18
- 13: 53457bd5ff674b32d756affac664e3be3752228ce1b54fc0f87d0e1a33cc2e9b 03281586 16 2/2 2024-11-15 01:13:09 00:010:17:54:56
- 14: 5b19194245af9e1c920efa90e5fe6c8dbed5decc36fa7fa736fd62f89d4a2bc6 03281658 16 2/4 2024-11-15 04:15:27 00:010:14:52:38
- 15: ec83d4f366e908630ce3ac606ed8cdc4be0968a662458edc8098472760d09e83 03281706 16 1/2 2024-11-15 05:44:36 00:010:13:23:29
{ "version": 2, "unlock_time": 8, "vin": [ { "key": { "amount": 0, "key_offsets": [ 21097116, 36566347, 53061645, 7474141, 83232, 291435, 626019, 155393, 1014, 13501, 21864, 534, 19016, 7190, 7985, 3610 ], "k_image": "92e0bad45ac3e832c8d6023a992630b20b4b4a3d225e760a266c3afe7e012a74" } } ], "vout": [ { "amount": 0, "target": { "tagged_key": { "key": "0aafe5ea9a6cd4ea992199ec44af89756b57bae0dd8d36a166ea4bdfcd7bbd7d", "view_tag": "0d" } } }, { "amount": 0, "target": { "tagged_key": { "key": "11f21c59534188aa0132a2ed1c368aceccb36ef64bf2bc06ff19718232cc5905", "view_tag": "9d" } } } ], "extra": [ 1, 235, 247, 249, 86, 6, 179, 129, 202, 99, 1, 29, 145, 205, 93, 194, 8, 17, 211, 7, 1, 164, 29, 41, 110, 97, 145, 58, 203, 89, 8, 38, 129, 2, 9, 1, 227, 239, 189, 148, 195, 52, 107, 89 ], "rct_signatures": { "type": 6, "txnFee": 30720000, "ecdhInfo": [ { "trunc_amount": "385c83cffb8dc46f" }, { "trunc_amount": "5d989f09fb6744e9" }], "outPk": [ "045b73487aa938e795b7db51ea6ee8217ff15922e52dca4c07d97d4f857fbb06", "f4d335672730382ba8fe27b82f0e88a11c71fd25784c71f6e6942947c5e408fa"] } }


Less details
source code | moneroexplorer