Monero Transaction bf3d4dcd590754c44c7b14ad9de1fd93bce4f427dcfa704b36a1dfdc11b39313

Autorefresh is OFF

Tx hash: bf3d4dcd590754c44c7b14ad9de1fd93bce4f427dcfa704b36a1dfdc11b39313

Tx prefix hash: 134b7231315e8a82caaaa0fb1656539575c76fa0c75c1679d2ccea15aa446262
Tx public key: ee2459e9b22647a14a4ed7d2ea95cd7e7248b4e1bf39197f90fc3469c033ded6
Payment id: 4e8b7a86faf4b8b28c798d827124066a2deb04dfbd2d30f98c8dd39e5b618d73

Transaction bf3d4dcd590754c44c7b14ad9de1fd93bce4f427dcfa704b36a1dfdc11b39313 was carried out on the Monero network on 2016-12-31 12:30:45. The transaction has 2087872 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1483187445 Timestamp [UTC]: 2016-12-31 12:30:45 Age [y:d:h:m:s]: 07:348:01:29:52
Block: 1213494 Fee (per_kB): 0.002000000000 (0.002598984772) Tx size: 0.7695 kB
Tx version: 1 No of confirmations: 2087872 RingCT/type: no
Extra: 0221004e8b7a86faf4b8b28c798d827124066a2deb04dfbd2d30f98c8dd39e5b618d7301ee2459e9b22647a14a4ed7d2ea95cd7e7248b4e1bf39197f90fc3469c033ded6

6 output(s) for total of 6.098000000000 xmr

stealth address amount amount idx tag
00: 03b2aee642192a5080bea3563d8e6f22cbae96e645adc26b6d312e31acd07a05 0.008000000000 232699 of 245068 -
01: 34629a3ca13c1419d4c80f9bae9fd90b7bd54de0de72773b444df162d70046e7 0.090000000000 304071 of 317822 -
02: b0fc67036c3624e7edbbf5d0d046c5eca64a21fdba6a6f6ab4e7f0c292594738 0.500000000000 1106580 of 1118624 -
03: 434498584f811bd0a0394f0f984b45e1a82f67b8f7041a46f122cdebd2d88ab0 0.500000000000 1106581 of 1118624 -
04: 15887739d142a5d245a70c78a510c157057c4d5595559aa4009c2c0c63c64236 1.000000000000 860357 of 874630 -
05: 855fc2d14c858833666b665251e9179121e309532f516b062b34ab0f3db09f36 4.000000000000 232658 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-04 09:31:40 till 2016-12-31 11:41:31; resolution: 4.64 days)

  • |_*__________________________*____________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________________________________________________*____________________________________________________________*|

2 inputs(s) for total of 6.100000000000 xmr

key image 00: beed45e3cee186d77b41f831c18e2edfdd6190baff6c9c0b86fd586d0119a8e3 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 77e2424fa5be757ba23ce32034e9546a196c1028e2c2bd1abbe5cdf1237a2434 00290215 1 38/180 2014-11-04 10:31:40 10:041:03:28:57
- 01: 7950b174ef3abb9b018b94043526223cd6be93f5f7f494cfc844687807699e60 00474850 1 23/58 2015-03-13 16:19:35 09:276:21:41:02
- 02: fc23c78809fbe84c2cbe9ce9fdbacb3b3eb0636b66649ebaf74a0bea369f313a 01213431 3 1/9 2016-12-31 10:41:31 07:348:03:19:06
key image 01: 9ab18acc0bdd7a89e8c063d4da30ac3c57ebbf3a083809e88f4ad730222062b5 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6b96cb796c2ed93d13e40445dee63ae665fbeb86fea01cd54efcc65dd96a32e 01004365 0 0/4 2016-03-19 17:27:53 08:269:20:32:44
- 01: 1af2af12c0229b22a4038470549249091d76960729cbff736cb1656149c9f335 01212127 3 3/3 2016-12-29 14:46:31 07:349:23:14:06
- 02: 936873c90f6ecbfc655add27f9ba2021273dd0fd23c715b68b324ffa85365a01 01213243 3 4/5 2016-12-31 05:16:12 07:348:08:44:25
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 618971, 97687, 250465 ], "k_image": "beed45e3cee186d77b41f831c18e2edfdd6190baff6c9c0b86fd586d0119a8e3" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 165834, 37483, 366 ], "k_image": "9ab18acc0bdd7a89e8c063d4da30ac3c57ebbf3a083809e88f4ad730222062b5" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "03b2aee642192a5080bea3563d8e6f22cbae96e645adc26b6d312e31acd07a05" } }, { "amount": 90000000000, "target": { "key": "34629a3ca13c1419d4c80f9bae9fd90b7bd54de0de72773b444df162d70046e7" } }, { "amount": 500000000000, "target": { "key": "b0fc67036c3624e7edbbf5d0d046c5eca64a21fdba6a6f6ab4e7f0c292594738" } }, { "amount": 500000000000, "target": { "key": "434498584f811bd0a0394f0f984b45e1a82f67b8f7041a46f122cdebd2d88ab0" } }, { "amount": 1000000000000, "target": { "key": "15887739d142a5d245a70c78a510c157057c4d5595559aa4009c2c0c63c64236" } }, { "amount": 4000000000000, "target": { "key": "855fc2d14c858833666b665251e9179121e309532f516b062b34ab0f3db09f36" } } ], "extra": [ 2, 33, 0, 78, 139, 122, 134, 250, 244, 184, 178, 140, 121, 141, 130, 113, 36, 6, 106, 45, 235, 4, 223, 189, 45, 48, 249, 140, 141, 211, 158, 91, 97, 141, 115, 1, 238, 36, 89, 233, 178, 38, 71, 161, 74, 78, 215, 210, 234, 149, 205, 126, 114, 72, 180, 225, 191, 57, 25, 127, 144, 252, 52, 105, 192, 51, 222, 214 ], "signatures": [ "24da41c6a9179f317fa2677cfbc9e7f1a7717630555bbab866bbb12a66149b0c52a064eac50a5edb3c6692502bf2352d75b612134414ebc622815436a8c04a0be0a7150e00cca0b1ede058470a08c8125a14ed2b2b5d7ed59239a9ce559c1d052dfa199a1725b3557cfbb17459d066dc01b75a3e1ac093134d129d121dd0090b9c4f136e727ced34d85357782616e3a9eb92a5fc81463ffd125673303d4a490463e9a6954796dfe269c5b88ce304acd695825866367fae02fe06fa6e1e1cdb02", "ea54fa144f40f0d2c0bc28a11f1e49939d09d09591cc8a20e8b8ce9d8d06fa05e0730b4bc8531558feeed56bf338d9623e894fce3944950cfe9590d534392201cec6cb9b736c75e95c2f3c00ea173cf78246c8bbfce83ff10de4a24a675967056f34e5ad315890e533929c51c8a116b4d8f8716c755f74aa0c60569000a8390eca4094a514461a8807aec5a9a1f218ce3da93796848dd00c9c97b70e645754083c1eaf4a868b939f5f5941c77adfffa5d64ca1390b7c2a6d58b3bb8fa4217e07"] }


Less details
source code | moneroexplorer