Monero Transaction bf705cd68d4fea6d66b06ecd00de9737ba92623b446fd3b0c059ca764728f5c5

Autorefresh is OFF

Tx hash: bf705cd68d4fea6d66b06ecd00de9737ba92623b446fd3b0c059ca764728f5c5

Tx public key: 68acf5bb58e5affab3a86bbf0b8507e763b26dcd03d8a8b4eab563c445632387
Payment id: fa2ed29de952db63ea8bbaa50c53c6ac0dbef4cee21cd7fc288d3233e96af17f

Transaction bf705cd68d4fea6d66b06ecd00de9737ba92623b446fd3b0c059ca764728f5c5 was carried out on the Monero network on 2016-02-16 18:09:00. The transaction has 2328250 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1455646140 Timestamp [UTC]: 2016-02-16 18:09:00 Age [y:d:h:m:s]: 08:282:06:46:51
Block: 959077 Fee (per_kB): 0.100000000000 (0.154916792738) Tx size: 0.6455 kB
Tx version: 1 No of confirmations: 2328250 RingCT/type: no
Extra: 0168acf5bb58e5affab3a86bbf0b8507e763b26dcd03d8a8b4eab563c445632387022100fa2ed29de952db63ea8bbaa50c53c6ac0dbef4cee21cd7fc288d3233e96af17f

7 output(s) for total of 7.100044355652 xmr

stealth address amount amount idx tag
00: 554a9b00a25c5c713dea400cb049c540395d31dbf844f0a613794bbbc18a8ec0 0.000102587135 0 of 1 -
01: eacc2fa2ce43800e787c33b69d9a0a2e108651cac68079a9bd913261cfcedcb6 0.008000000000 187759 of 245068 -
02: 2087d9fdd99b9c23ea093dbb252869ce31a9b7c7c6312db9dde5f676f525698d 0.100000000000 865374 of 982315 -
03: c00ee5276c32a7ede68620ed9682f9001c3ff50c214812ee28a4c2a1782ebb3c 0.001941768517 0 of 2 -
04: 3f19e50b87bfe2a4ade544e5297e94733b3c33c2f66df2547d4b7179f036b57c 0.090000000000 217727 of 317822 -
05: 8dbd6c90acb6237f405861eda30e31cdd17e6ee2f3f31a27e9408c817d3c398f 0.900000000000 334284 of 454894 -
06: 797e44a2fae156244e0b5368474117ade716bfdb23e9400d9d2cf9480f21ab2b 6.000000000000 130526 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 7.200044355652 xmr

key image 00: bf59c2c1d0f8b8526a26c248ede5854248482259f513301dc41eca98bb42f0c2 amount: 0.000044355652
ring members blk
- 00: 9dd26e2f99ae3dbbc4068ed965a9abb50ef53da9479b1ab87c8da53abbab03d1 00937804
key image 01: e793507f6eec8866c52e2e54bb956b9d8be79f7a46cc49a42b0ea4cd7943b28e amount: 0.200000000000
ring members blk
- 00: 2624e5d8e6b3152bdb88118389637a56992838dfc989fc73d6dfb220321370bb 00954163
key image 02: cec33a72209e7bdcdd6170bbe9180ea03b5d13082a16fb5ea5460003335fd7e1 amount: 7.000000000000
ring members blk
- 00: e83fae86af343053c8ef4cd41716b27d030e44eefb6b0f94b25040395cf4590a 00956997
More details
source code | moneroexplorer