Monero Transaction bf26dc9f614713a54364dcfb6eeae3471380f38b8f18de214e7e0a72330f9471

Autorefresh is OFF

Tx hash: bf26dc9f614713a54364dcfb6eeae3471380f38b8f18de214e7e0a72330f9471

Tx prefix hash: 149ae8194e2daa9923ee59898b6be1737a43c07ed9df964b8072a280d2312d56
Tx public key: e995c78c1b920e8c28bc505eb1896c9d1937ba531c71da0c2f842b35ac765a1b
Payment id: fb7758388cc3b57ae65a9dc86eb88f9ec802641bda182fc78503c3a656f3cea3

Transaction bf26dc9f614713a54364dcfb6eeae3471380f38b8f18de214e7e0a72330f9471 was carried out on the Monero network on 2014-07-22 13:13:54. The transaction has 3138263 confirmations. Total output fee is 0.005078860000 XMR.

Timestamp: 1406034834 Timestamp [UTC]: 2014-07-22 13:13:54 Age [y:d:h:m:s]: 10:113:21:06:56
Block: 139999 Fee (per_kB): 0.005078860000 (0.007143890989) Tx size: 0.7109 kB
Tx version: 1 No of confirmations: 3138263 RingCT/type: no
Extra: 022100fb7758388cc3b57ae65a9dc86eb88f9ec802641bda182fc78503c3a656f3cea301e995c78c1b920e8c28bc505eb1896c9d1937ba531c71da0c2f842b35ac765a1b

8 output(s) for total of 7.004921140000 xmr

stealth address amount amount idx tag
00: f6f6b37d4fb05a696ae30df37f01d731f5a0e3aa139dee0199d78f7de53738aa 0.000921140000 0 of 1 -
01: ba3d1556768711e0a7929f7665d7890f6fcdffdc91100ac1355b3151abc7fe0e 0.007000000000 163956 of 247340 -
02: b3d6f86311b99a51838a49d7eab2eb207f353aae5a767045e1aba914d113bcd5 0.007000000000 163957 of 247340 -
03: eb22d348dfad060d62b86052fdc79d7d0671bde2d6679a43e4b29d54b03e48d9 0.020000000000 201780 of 381491 -
04: 3c3d448f7080d26de1a26ddee90af408f6c64ee116b8dfbd082c1da7754f5e82 0.070000000000 85829 of 263947 -
05: 9fe9f5aac0d58a107da8cdfb8712c96e9b71b09af73d647802d78a4223de3b5b 0.900000000000 62128 of 454894 -
06: 39c82ca130202cf113eca50bfe538b3ae5ae4ad731ecf60ce510b20e2bb81e95 2.000000000000 50012 of 434057 -
07: 8248556c759e0c19a4105b8848d3f99df7e50224aaacb6657f7032eaf7b4baaf 4.000000000000 26268 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-27 10:35:10 till 2014-07-22 13:48:34; resolution: 0.51 days)

  • |_____________________________________________________________________________________*___________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 7.010000000000 xmr

key image 00: ff02047f712dc90ad82ec3ce27cd710a670f5cf7d9abbf72628e820115bb1e13 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f7e7718095f704667fc970aa6a4a4e30adaa53d5047b8d03617740154b06788b 00077297 1 8/279 2014-06-09 07:48:11 10:157:02:32:39
- 01: c57427cb96faf6939478f06264bc94e841c56e5fad8758ebbe567e6e869b8157 00139972 2 6/6 2014-07-22 12:48:34 10:113:21:32:16
key image 01: afe6b464d70dd1a3bcc83ba2c503922126a05a3c8f81760f1ba42bd73810e54c amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3b544adc070149b80ced74444ecec8d92006e41669805b6edbeeb0a97b0f6506 00013693 0 0/8 2014-04-27 11:35:10 10:199:22:45:40
- 01: 270200b5a85aa3df948e99568db72ca6de365333fa66a4620b22c20090037c9f 00139961 2 6/8 2014-07-22 12:37:03 10:113:21:43:47
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 131033, 185072 ], "k_image": "ff02047f712dc90ad82ec3ce27cd710a670f5cf7d9abbf72628e820115bb1e13" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 13665, 32309 ], "k_image": "afe6b464d70dd1a3bcc83ba2c503922126a05a3c8f81760f1ba42bd73810e54c" } } ], "vout": [ { "amount": 921140000, "target": { "key": "f6f6b37d4fb05a696ae30df37f01d731f5a0e3aa139dee0199d78f7de53738aa" } }, { "amount": 7000000000, "target": { "key": "ba3d1556768711e0a7929f7665d7890f6fcdffdc91100ac1355b3151abc7fe0e" } }, { "amount": 7000000000, "target": { "key": "b3d6f86311b99a51838a49d7eab2eb207f353aae5a767045e1aba914d113bcd5" } }, { "amount": 20000000000, "target": { "key": "eb22d348dfad060d62b86052fdc79d7d0671bde2d6679a43e4b29d54b03e48d9" } }, { "amount": 70000000000, "target": { "key": "3c3d448f7080d26de1a26ddee90af408f6c64ee116b8dfbd082c1da7754f5e82" } }, { "amount": 900000000000, "target": { "key": "9fe9f5aac0d58a107da8cdfb8712c96e9b71b09af73d647802d78a4223de3b5b" } }, { "amount": 2000000000000, "target": { "key": "39c82ca130202cf113eca50bfe538b3ae5ae4ad731ecf60ce510b20e2bb81e95" } }, { "amount": 4000000000000, "target": { "key": "8248556c759e0c19a4105b8848d3f99df7e50224aaacb6657f7032eaf7b4baaf" } } ], "extra": [ 2, 33, 0, 251, 119, 88, 56, 140, 195, 181, 122, 230, 90, 157, 200, 110, 184, 143, 158, 200, 2, 100, 27, 218, 24, 47, 199, 133, 3, 195, 166, 86, 243, 206, 163, 1, 233, 149, 199, 140, 27, 146, 14, 140, 40, 188, 80, 94, 177, 137, 108, 157, 25, 55, 186, 83, 28, 113, 218, 12, 47, 132, 43, 53, 172, 118, 90, 27 ], "signatures": [ "98820aa835317770f41060a77fa51835cd4474c419ff7f0d97e7db9b636528096d5dd731525d6374be70ae9c3e0101495262c9f1d0baa24b4b4f40ec418b5f0ab36d04d7e0979ca88b7de3bdf98d1e8d7a426aba72d2766715d336b132513405d67c3c84e1c5432a603b0e43463bdecebf62a0d5917ce41529a1f2dcf4552e0e", "fa29af8c7611d1e118bff01682b735a203369af55585b3be8073f0bc93ef08056c3e194b1db9b3709a1bed78d56a07614eded8e41f10fc8c52fff770374b3a054cfe8b268cead45c3843ade4bf5251aa9384512ecefc1019f130a369b1b6a20b62396cd41583c25a5758a7f9967e12268af1b60f6339c44c499c2c64d62faa05"] }


Less details
source code | moneroexplorer