Monero Transaction bf61fbfc3eba193bf20c9918e9c6f68af791d69c86ba1a612571ebf56124c44d

Autorefresh is OFF

Tx hash: bf61fbfc3eba193bf20c9918e9c6f68af791d69c86ba1a612571ebf56124c44d

Tx prefix hash: a62bbd54d42eddfb840a3820a5ca08c2040ed640efdcc774620999f849c64b7a
Tx public key: 5904106ad96096b3eacb31d492f451615766f54177ca8b9b00cfd8653fa36f7f
Payment id: ef5bd61956c5ed94442811e38654d2a0b26ea8e9688897cf410438e6609ad9bc

Transaction bf61fbfc3eba193bf20c9918e9c6f68af791d69c86ba1a612571ebf56124c44d was carried out on the Monero network on 2014-07-19 19:21:25. The transaction has 3144158 confirmations. Total output fee is 0.005795640000 XMR.

Timestamp: 1405797685 Timestamp [UTC]: 2014-07-19 19:21:25 Age [y:d:h:m:s]: 10:119:08:37:06
Block: 136019 Fee (per_kB): 0.005795640000 (0.007737594993) Tx size: 0.7490 kB
Tx version: 1 No of confirmations: 3144158 RingCT/type: no
Extra: 022100ef5bd61956c5ed94442811e38654d2a0b26ea8e9688897cf410438e6609ad9bc015904106ad96096b3eacb31d492f451615766f54177ca8b9b00cfd8653fa36f7f

9 output(s) for total of 5.074204360000 xmr

stealth address amount amount idx tag
00: 2afcdd1f773e2645bb98006e9744f165bbf8182bbf9531d1db073479690c5424 0.000204360000 0 of 2 -
01: 1a6291fe4fba44800e58af06a81762f7b2dccc549bf736d443c3f03f6eb49b40 0.007000000000 163120 of 247340 -
02: 07c07b49060840123aba1644b4a43fdb098f826b5f7d4618cd60dcd57d177ac7 0.007000000000 163121 of 247340 -
03: 23d2875921f8197c9f7c869adce62d2e1b79865c8db69376dd7b42c4003dd6a5 0.020000000000 200870 of 381492 -
04: aa74ab633c20207cf311e604498f1c4d4495a950cb164bce45fc3425f3b500a4 0.040000000000 122044 of 294095 -
05: 5d3a214d3e9eccf5000c9dbd9dd494844e85712d01a5b35fd217a9f49e36aeff 0.300000000000 108273 of 976536 -
06: 4484c79cc57fc320ab75f91dbae025d91ab8a1e027381ffd1d196e503d33b41d 0.700000000000 72559 of 514467 -
07: a2de8224ddaa2c44cc24b5129c3671a537b80d916a871cb86d8304dc4e75f54f 1.000000000000 116573 of 874629 -
08: b3ce561d26ae1a633cb4df1f6ac432dc9fca1a44ff338f5e09c8aea3b765878d 3.000000000000 30545 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 19:03:59 till 2014-07-19 20:01:03; resolution: 0.26 days)

  • |____________________________________*____________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 5.080000000000 xmr

key image 00: 947f9094a808f8175a1f71e0d9d64153b4432d3ef427dd9740f93c60670b315d amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 29cc08609be4b143487cb22ffcf69ca47fa9da5122994508d4216f962e3180d4 00084688 1 5/145 2014-06-14 08:29:13 10:154:19:29:18
- 01: 97a4d9b36132e59228d266c4f30aac96cc9168be7e6616d55fef75ea95d6c4ab 00135999 2 8/166 2014-07-19 19:01:03 10:119:08:57:28
key image 01: 1cb75d6ec870549c8a74749c97749b03cf9df817c86b3e5e22add9ea24549ba7 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 80017514a9f9bdf727694747c2fca3ea61880af95836a78e693de7b36f7cf129 00070891 1 29/69 2014-06-04 20:03:59 10:164:07:54:32
- 01: 774812cb29d50ce7c09c1718da01e16bb55b2d4fa7a44ef62468d0a87ca35482 00135902 0 0/5 2014-07-19 17:42:46 10:119:10:15:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000, "key_offsets": [ 46930, 32565 ], "k_image": "947f9094a808f8175a1f71e0d9d64153b4432d3ef427dd9740f93c60670b315d" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 4402, 56718 ], "k_image": "1cb75d6ec870549c8a74749c97749b03cf9df817c86b3e5e22add9ea24549ba7" } } ], "vout": [ { "amount": 204360000, "target": { "key": "2afcdd1f773e2645bb98006e9744f165bbf8182bbf9531d1db073479690c5424" } }, { "amount": 7000000000, "target": { "key": "1a6291fe4fba44800e58af06a81762f7b2dccc549bf736d443c3f03f6eb49b40" } }, { "amount": 7000000000, "target": { "key": "07c07b49060840123aba1644b4a43fdb098f826b5f7d4618cd60dcd57d177ac7" } }, { "amount": 20000000000, "target": { "key": "23d2875921f8197c9f7c869adce62d2e1b79865c8db69376dd7b42c4003dd6a5" } }, { "amount": 40000000000, "target": { "key": "aa74ab633c20207cf311e604498f1c4d4495a950cb164bce45fc3425f3b500a4" } }, { "amount": 300000000000, "target": { "key": "5d3a214d3e9eccf5000c9dbd9dd494844e85712d01a5b35fd217a9f49e36aeff" } }, { "amount": 700000000000, "target": { "key": "4484c79cc57fc320ab75f91dbae025d91ab8a1e027381ffd1d196e503d33b41d" } }, { "amount": 1000000000000, "target": { "key": "a2de8224ddaa2c44cc24b5129c3671a537b80d916a871cb86d8304dc4e75f54f" } }, { "amount": 3000000000000, "target": { "key": "b3ce561d26ae1a633cb4df1f6ac432dc9fca1a44ff338f5e09c8aea3b765878d" } } ], "extra": [ 2, 33, 0, 239, 91, 214, 25, 86, 197, 237, 148, 68, 40, 17, 227, 134, 84, 210, 160, 178, 110, 168, 233, 104, 136, 151, 207, 65, 4, 56, 230, 96, 154, 217, 188, 1, 89, 4, 16, 106, 217, 96, 150, 179, 234, 203, 49, 212, 146, 244, 81, 97, 87, 102, 245, 65, 119, 202, 139, 155, 0, 207, 216, 101, 63, 163, 111, 127 ], "signatures": [ "6ecc186387a54b81d2a2ca16ff6912a5eb37d57077b6b903267f0ace8b029d083c534bc3c7033ead87d8b94452620be6da813954239673d5d2f5e99b9b1f9802122096adf229a960aa7a49bc616bf6378c2a9cdb7816ef61f5995be7f2ebd703ac7ad1d7ec84784d66f3228b0f124f0d719c12f01a49f424951f885755ad370e", "121d3dfcb6ef81f4f8b04145ca3fbbe0aa38c776da407b81327c98c5b5df550959d4be1aba869a2b4ef8b9b10689e0d72f03994d8553dcabc66ce1ac874ebd032ab2cfaf350d16aa4d7b9be062a81fa49b0e399a98c3ca065323ebec663080001f22ff4a3ebcfb0d59a7088a859255af8f2f3fa842801a632523ed0f6f9d8403"] }


Less details
source code | moneroexplorer