Monero Transaction bf42bfe2609ea8af107403b07bb3bedc3f33f636736ca467b28e2fccc2f6e5a5

Autorefresh is OFF

Tx hash: bf42bfe2609ea8af107403b07bb3bedc3f33f636736ca467b28e2fccc2f6e5a5

Tx public key: 4df19a092afe36e3637b74ae9e21b6f0ebf2bb787e4ee52e4d3ac48229cbc6ab
Payment id: 871fc12280abb35569425f29ee9f3ccabc3eb2c10e49b7927466af19aa97432e

Transaction bf42bfe2609ea8af107403b07bb3bedc3f33f636736ca467b28e2fccc2f6e5a5 was carried out on the Monero network on 2014-09-05 12:59:27. The transaction has 3083762 confirmations. Total output fee is 0.188207062487 XMR.

Timestamp: 1409921967 Timestamp [UTC]: 2014-09-05 12:59:27 Age [y:d:h:m:s]: 10:082:22:38:42
Block: 204602 Fee (per_kB): 0.188207062487 (0.182850125225) Tx size: 1.0293 kB
Tx version: 1 No of confirmations: 3083762 RingCT/type: no
Extra: 022100871fc12280abb35569425f29ee9f3ccabc3eb2c10e49b7927466af19aa97432e014df19a092afe36e3637b74ae9e21b6f0ebf2bb787e4ee52e4d3ac48229cbc6ab

6 output(s) for total of 20.312230430000 xmr

stealth address amount amount idx tag
00: f2589ed8adf019c0e527b36d82eff0f997f9cb0bff000588552660de786f62b3 0.012230430000 0 of 1 -
01: a21a02a8d6378d5153a3ae9ea05f809fc2ae896214f7ff8c3c0a27b881588791 0.100000000000 523664 of 982315 -
02: 7cffb7316871606bb271ebc0609c70d0bdf890e353618f0cf9f0b35da8935d8d 0.200000000000 468965 of 1272210 -
03: bf97a1e9fb12899fc85a2f0b526bccc43d39c129b6e866e42f5eed81dc0c699a 1.000000000000 240344 of 874629 -
04: 425f2fa27f91c1d296b1a8a81cb279b6b20f047d48657ea54c36e7b503b4ce6e 9.000000000000 19279 of 274259 -
05: d5307cad347e9571062337eb69e9a65a5e8d6e1f1b2309c9cb12f4c746d3de99 10.000000000000 237003 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 20.500437492487 xmr

key image 00: a8b4f3adba5bad552f012836edcfb08b3411cb5def3ce01defb82f69cd050d29 amount: 0.000437492487
ring members blk
- 00: 9f2323024ae2be4e09567340b435d7eabb24e288a0b43274591bad399d46ae05 00185233
key image 01: 5890e659d94475e86be27701985418ce6ab5b627da0223827f6ddddab21a7c60 amount: 0.500000000000
ring members blk
- 00: fbf558c14f4a327378b25da466d7ab316aa16079f84531d5ffe28541a8d85065 00203372
key image 02: 5ed1c7cbcf98d83edab2009655d9913b3aa5d47ba0af9b9a35489a36e305f269 amount: 4.000000000000
ring members blk
- 00: f51cacd4bd01537c7c1245621602bc8dfd99e5c7ef7833dc3cae5a58187ec52b 00203231
key image 03: 0e32d91d96bca87154747ac0fb08d46415d2f63ee53486ec896a5ea8b98b07c7 amount: 4.000000000000
ring members blk
- 00: 10b3d01c40c1e0db70c7557c1e5553f0f4b826ee085618d9a4857bde1e9b6f8a 00202977
key image 04: 4dffc70835bef27e5da37a7f41e3608647ed22de860baba8a1146b989519bdba amount: 4.000000000000
ring members blk
- 00: a9c27e4a65746c00feda74c46f0e9ceec7615ce3ce55a4c17759409d9ace8aa4 00204193
key image 05: 8bc3da2a9ba9b1d29dcbddc4e863f2852e6786019f4999c201d08a86ea767a06 amount: 4.000000000000
ring members blk
- 00: 03b82b8b23a49e5aa581d4f1348ec56e1050b24743803e51d9ea4a052e5c330c 00204272
key image 06: 76cf865b1ee0eb1e408e92bfaab94a7486159c3e44bfa5a22dd323e8e957af29 amount: 4.000000000000
ring members blk
- 00: c8b93505e615edd02adf191b7ca890a712b4992400cf2e9ed318e9b062b92732 00203622
More details
source code | moneroexplorer