Monero Transaction bf4e306dc79bd6947f9bdf102f8d76f9c02d3e6ba389b07792342bd89aaf2eef

Autorefresh is OFF

Tx hash: bf4e306dc79bd6947f9bdf102f8d76f9c02d3e6ba389b07792342bd89aaf2eef

Tx prefix hash: 4071f36cad1950ff913985572c5d1004eea8f50492368749c6f1b12158ac867e
Tx public key: 53f4d402e58124ccd972ea66b0ca08b5e960b862ecb8549e05a49976e8c4c46b
Payment id: 8a8751e5cf2ed37109ea14c5b2a6eafe521c3ccc475935cfef00c276a8ca81fd

Transaction bf4e306dc79bd6947f9bdf102f8d76f9c02d3e6ba389b07792342bd89aaf2eef was carried out on the Monero network on 2014-07-12 00:16:13. The transaction has 3118375 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405124173 Timestamp [UTC]: 2014-07-12 00:16:13 Age [y:d:h:m:s]: 10:075:12:11:38
Block: 124690 Fee (per_kB): 0.010000000000 (0.012337349398) Tx size: 0.8105 kB
Tx version: 1 No of confirmations: 3118375 RingCT/type: no
Extra: 0221008a8751e5cf2ed37109ea14c5b2a6eafe521c3ccc475935cfef00c276a8ca81fd0153f4d402e58124ccd972ea66b0ca08b5e960b862ecb8549e05a49976e8c4c46b

3 output(s) for total of 1.120000000000 xmr

stealth address amount amount idx tag
00: edcfe38b65b28f4db5e7b23e1d7dd8a7f268d2a11199c76aa16e021f2ae4af9e 0.020000000000 198039 of 381490 -
01: 17d6947b10fecd6051d9848c504c8fcaeda0d132f77ed9c32191aee7bc3921f3 0.100000000000 267126 of 982315 -
02: 199fc8c071722c3a5ecc3356203ccb13d6f520b70ac54aba31f572fd31ce44d8 1.000000000000 94655 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-11 10:51:18 till 2014-07-11 22:13:31; resolution: 0.00 days)

  • |_______________________*__________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________*_______________________________________________________________________________________________________________|
  • |_______________*__________________________________________________________________________________________________________________________________________________________|
  • |____________________________________*_____________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________*____________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________*______________|

6 inputs(s) for total of 1.130000000000 xmr

key image 00: 490232601fff1c5707d82fb0730eaf5b5ae279aa075dbefde97a6deec986983c amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a26fd0552655ae504035a4b20d5ab0a6cbfc4fe95f2250bf133cccefd90a2de5 00123995 4 7/55 2014-07-11 12:22:40 10:076:00:05:11
key image 01: c3338d24f144a32ff1371a277cdf8834b1fba7bb404e8d55dabe66b0cc84ea93 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 699047c7ab35146c5bbf79647e20014673654930941c0f9dde021356185b4bb7 00124139 4 12/54 2014-07-11 14:42:36 10:075:21:45:15
key image 02: 146c05fe658751937ede42e7521a1d363e3de7792569feeda3b8fc2dbce0899d amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68a37cc1afb2cbbf4daededabf3e7ddc5ec9c9294499eae11d187f2f5cfbc7a7 00123967 1 6/2 2014-07-11 11:51:18 10:076:00:36:33
key image 03: 12e91c316d7964a2eb9aa9702c74e10c475a916e2678f4e1d949f644c7110f6d amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e33b85f28502b41dbae1513157948210bd136617576f39afc95f9a20a1a87822 00124049 4 4/55 2014-07-11 13:13:13 10:075:23:14:38
key image 04: 791427336a293d222d4c089a32ce163b592561a20cd77dd6ea8ce28a0cb2e881 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 88732025be91dac5b2b1889402aa4adfdb0d834146b7daa7d981ce0b5bcaa33d 00124262 4 6/56 2014-07-11 17:03:14 10:075:19:24:37
key image 05: e3a0413dd893181dfe9288fadf9266aeb7e084ec976ddc670c5cef06a9660556 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ce2fd976a2f0b60daff80de6280c06d81d918c47df4cead39d4d274505b1ffd9 00124525 4 14/58 2014-07-11 21:13:31 10:075:15:14:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 177874 ], "k_image": "490232601fff1c5707d82fb0730eaf5b5ae279aa075dbefde97a6deec986983c" } }, { "key": { "amount": 200000000000, "key_offsets": [ 178599 ], "k_image": "c3338d24f144a32ff1371a277cdf8834b1fba7bb404e8d55dabe66b0cc84ea93" } }, { "key": { "amount": 30000000000, "key_offsets": [ 146928 ], "k_image": "146c05fe658751937ede42e7521a1d363e3de7792569feeda3b8fc2dbce0899d" } }, { "key": { "amount": 200000000000, "key_offsets": [ 178199 ], "k_image": "12e91c316d7964a2eb9aa9702c74e10c475a916e2678f4e1d949f644c7110f6d" } }, { "key": { "amount": 200000000000, "key_offsets": [ 179155 ], "k_image": "791427336a293d222d4c089a32ce163b592561a20cd77dd6ea8ce28a0cb2e881" } }, { "key": { "amount": 300000000000, "key_offsets": [ 94949 ], "k_image": "e3a0413dd893181dfe9288fadf9266aeb7e084ec976ddc670c5cef06a9660556" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "edcfe38b65b28f4db5e7b23e1d7dd8a7f268d2a11199c76aa16e021f2ae4af9e" } }, { "amount": 100000000000, "target": { "key": "17d6947b10fecd6051d9848c504c8fcaeda0d132f77ed9c32191aee7bc3921f3" } }, { "amount": 1000000000000, "target": { "key": "199fc8c071722c3a5ecc3356203ccb13d6f520b70ac54aba31f572fd31ce44d8" } } ], "extra": [ 2, 33, 0, 138, 135, 81, 229, 207, 46, 211, 113, 9, 234, 20, 197, 178, 166, 234, 254, 82, 28, 60, 204, 71, 89, 53, 207, 239, 0, 194, 118, 168, 202, 129, 253, 1, 83, 244, 212, 2, 229, 129, 36, 204, 217, 114, 234, 102, 176, 202, 8, 181, 233, 96, 184, 98, 236, 184, 84, 158, 5, 164, 153, 118, 232, 196, 196, 107 ], "signatures": [ "22cd52203d9d9b4f0e9775e7110a39aaaa2128731851a360ae9dd0e8c620c603ed500f66a32c05bc529f9953036d28256450fa902f8e395db2bc3c55c7959006", "654cab772d3b6648dd62bffb654317dc235c8c4cfb32f202d974a04d304c820f7ae1660a7ab3679ebe806d5467d71d62ac35999c11dcb92e684c2b9b72e28d06", "a271f5f884f0470e6e37fd541df44a374ab3f9a8c635b74af054623fcdf02e02fe5f88dcd7c4abdcabf0c164eb57d85d4047d7b4338549d21510a57231e43e08", "e9656a939a923984c2028bd96bb64602c411de91eba2309015e6e1a4b9757e0607c3c636fb581864bd527ed01bcf9fbc99ef100de9698ecb19491c77a83e2f07", "385f465c4dab5c83831d24838589bd16dc2ba885cc7084fce3baa80c1f84bb0e41450f049842cc02acbc690ec3175f1bf1e3d370a059f253111321485adb190b", "20549adbc6826561553265b1c07e015b5f310ff25a88e26f8c7149f6d2456f0e8d593ee3fed8548ea90f4da651f4a6e75d871f8e2f55f0d720dc97449efd2f0f"] }


Less details
source code | moneroexplorer