Monero Transaction bf6aa6c2ec774f12f864bcd35bc3e3a0ee2a1690df7e5c6b79a097a4cd3f3084

Autorefresh is OFF

Tx hash: bf6aa6c2ec774f12f864bcd35bc3e3a0ee2a1690df7e5c6b79a097a4cd3f3084

Tx prefix hash: 683bf11db50d1c019c76a60b09a71ccfbf5fbe5de1aded01880dcf931fed253b
Tx public key: 245f9410cc36576d86ff7ab3bf3836f7e0fd8a8825ef6f626df2506ddb4b8178
Payment id: da210afd6ef51165981587c880edcea4a9247ad6351b773cbe72a524ec421885

Transaction bf6aa6c2ec774f12f864bcd35bc3e3a0ee2a1690df7e5c6b79a097a4cd3f3084 was carried out on the Monero network on 2014-08-13 19:26:58. The transaction has 3130587 confirmations. Total output fee is 0.005784710000 XMR.

Timestamp: 1407958018 Timestamp [UTC]: 2014-08-13 19:26:58 Age [y:d:h:m:s]: 10:125:12:20:28
Block: 172000 Fee (per_kB): 0.005784710000 (0.005941367141) Tx size: 0.9736 kB
Tx version: 1 No of confirmations: 3130587 RingCT/type: no
Extra: 022100da210afd6ef51165981587c880edcea4a9247ad6351b773cbe72a524ec42188501245f9410cc36576d86ff7ab3bf3836f7e0fd8a8825ef6f626df2506ddb4b8178

6 output(s) for total of 2.112215290000 xmr

stealth address amount amount idx tag
00: 3b4e89a0e9b7429ba4fdbbaf61c5a0cedc928fba06ad08715aab5105346bb887 0.000215290000 1 of 3 -
01: 3838de7788f9451c645eb32a915f17734593f0eacf312133d57d2c417c326114 0.006000000000 183240 of 256624 -
02: e5f5211524d7f3220952f2e40471f1b8f4163890aaabb98b6ce81b404b1794f2 0.006000000000 183241 of 256624 -
03: 13bbaf9da63ed56269b68893772ae2bebaa70ed4bbf01938272da0a29d4d8827 0.400000000000 149487 of 688584 -
04: 24d0c1efa0653efa1ad66894cbe072671289ca672d4230888be0cd862d52da4d 0.700000000000 106945 of 514467 -
05: b7d59f19568bbe0cab0fd8b1c3896bc34aff12c441a7cde5ec827c3124e0389e 1.000000000000 187633 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-29 02:32:05 till 2014-08-13 19:30:52; resolution: 0.45 days)

  • |___________*_____________________________________________________________________________________________________________________________________________________________*|
  • |_______________*_________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________*______________________________________________________________________________________________*|

4 inputs(s) for total of 2.118000000000 xmr

key image 00: a09197b83eee7e701a3dc1d27a724b51315e6f91743560016463c3a632bab084 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fcc23e4010f1e8e0af0be42b498d5e0f05f3ab547dc1eb7f11d9f3a41b9402a0 00067916 1 1/77 2014-06-02 19:17:41 10:197:12:29:45
- 01: bcfdd1e91a7248d1c748692d3924585b216c2ebf91776ab0cb9bdebcbb7d6e9a 00171941 2 2/8 2014-08-13 18:30:52 10:125:13:16:34
key image 01: 725ed40d2ffc428feb09e9fb68c273a589f95dc4d6ce6b27a73de6052667fe14 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6db828f20f5ebe3eba213ff189e366610b9f94fdf5d3fb2fd3f7086f14e284a5 00070583 1 28/67 2014-06-04 15:04:54 10:195:16:42:32
- 01: 2d6407ffe6bf05b534f42c22122568e629d47d6e3f86dde79143d2d0d68ebbb3 00171872 2 2/9 2014-08-13 17:15:51 10:125:14:31:35
key image 02: 9c40cef5501714dc1b1f192da9271deedee12cef93613927733ee03d68e17a27 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4c4556a49bc813d83971107b03d2a6d60cff3dcc5be1a5a9f36d36dd0e30985d 00061314 1 3/150 2014-05-29 03:32:05 10:202:04:15:21
- 01: 98dd94c2fa5c40e7b79d62d0cbb3bd760defd1df26af1244face8e17240585d2 00171829 2 2/7 2014-08-13 16:35:23 10:125:15:12:03
key image 03: ed8edad606fc9d9185f318d270bd67895fa54d6563950e2b777eae7825cfca33 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6c151acf394d8a869a9e118b9ea5c9fe638521349faa11079d51f66c75a642c4 00109562 1 21/6 2014-07-01 11:02:51 10:168:20:44:35
- 01: 30e09d53d1748005cc8b400f2dab7ac089a50e002f9f32fffaf7e4347fa6504a 00171852 2 4/7 2014-08-13 16:54:57 10:125:14:52:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 34577, 132457 ], "k_image": "a09197b83eee7e701a3dc1d27a724b51315e6f91743560016463c3a632bab084" } }, { "key": { "amount": 90000000000, "key_offsets": [ 19610, 84762 ], "k_image": "725ed40d2ffc428feb09e9fb68c273a589f95dc4d6ce6b27a73de6052667fe14" } }, { "key": { "amount": 20000000000, "key_offsets": [ 30071, 185155 ], "k_image": "9c40cef5501714dc1b1f192da9271deedee12cef93613927733ee03d68e17a27" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 27569, 45827 ], "k_image": "ed8edad606fc9d9185f318d270bd67895fa54d6563950e2b777eae7825cfca33" } } ], "vout": [ { "amount": 215290000, "target": { "key": "3b4e89a0e9b7429ba4fdbbaf61c5a0cedc928fba06ad08715aab5105346bb887" } }, { "amount": 6000000000, "target": { "key": "3838de7788f9451c645eb32a915f17734593f0eacf312133d57d2c417c326114" } }, { "amount": 6000000000, "target": { "key": "e5f5211524d7f3220952f2e40471f1b8f4163890aaabb98b6ce81b404b1794f2" } }, { "amount": 400000000000, "target": { "key": "13bbaf9da63ed56269b68893772ae2bebaa70ed4bbf01938272da0a29d4d8827" } }, { "amount": 700000000000, "target": { "key": "24d0c1efa0653efa1ad66894cbe072671289ca672d4230888be0cd862d52da4d" } }, { "amount": 1000000000000, "target": { "key": "b7d59f19568bbe0cab0fd8b1c3896bc34aff12c441a7cde5ec827c3124e0389e" } } ], "extra": [ 2, 33, 0, 218, 33, 10, 253, 110, 245, 17, 101, 152, 21, 135, 200, 128, 237, 206, 164, 169, 36, 122, 214, 53, 27, 119, 60, 190, 114, 165, 36, 236, 66, 24, 133, 1, 36, 95, 148, 16, 204, 54, 87, 109, 134, 255, 122, 179, 191, 56, 54, 247, 224, 253, 138, 136, 37, 239, 111, 98, 109, 242, 80, 109, 219, 75, 129, 120 ], "signatures": [ "7d64fa5012315d228369e78b05ee038c9ab3376398b1f9dd12e1018f20d3e1052e51ebaf7813384521567b9a5d9ffe9f312b5dfbec47a64b25a270887655e00806a49bf3fbcce8ca104e1e4084800bdf453bf52b80d136cba673b6786513e30c62518e00eb84e7629a680597e9ba3a2c781a65ce02404d6c376db00c03e28d06", "27eb073d0379d2c861818d3e9c177fadd15ce19dbdb431bdb5b2ae01b8c7f806c853c839f11d81f76535ca52f74ce5d75e52b1a7f75f26aa47a6c7bcf491950f267f819fd3193e70043077728a144fedfe84bc0f0d036071eade50859a83fe08422d3d0d8327dfad6844ac381d417f04e62f88636b7d56b7a9bad2700bbe0c08", "ebb0c89478d851f51c14e168f62d749191064f7f8c2b3ae36b98f7d40229610307914774793d521f33b1e8762d4a83d169bcbd097d613f6010851fe798fc6b063cb8e8617ade363724b884372788d09a53040f129b2907327123b327eaed5f07f290cb55161d734603cfec33ebd8e89adc22300c916541f0863173ede0441a0e", "26eac9f143605097eb9122f7e149a0a4df8b3c0d472b775cc804b336e00edf03f302299faa5230098212e947a14e5b4eb24e5c84884ea71ea7f3e8bee1356c0364183be7512551d4c484d2a45d74f2c8697730a25a9fb7624ad842d5777f48088640568dc1afb4f8e175ae97bd280f347700ed1a29cce9792ff64d431dd90003"] }


Less details
source code | moneroexplorer