Monero Transaction bf7af2780ae253298db76984cc3736c4aafc7da6c0b7eeafacb01f3e407e22b1

Autorefresh is OFF

Tx hash: bf7af2780ae253298db76984cc3736c4aafc7da6c0b7eeafacb01f3e407e22b1

Tx prefix hash: 242f8f33df4d2d4854e3e95cdfe88d0d887316e79a9f97d2530e09e717c592a0
Tx public key: fff022d3b8a7a4f9df713fde51f94c1993c36ba869d40d864ed18dcdae8c800d
Payment id (encrypted): bb2ecb4a4a5a0339

Transaction bf7af2780ae253298db76984cc3736c4aafc7da6c0b7eeafacb01f3e407e22b1 was carried out on the Monero network on 2016-11-22 17:00:51. The transaction has 2120924 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1479834051 Timestamp [UTC]: 2016-11-22 17:00:51 Age [y:d:h:m:s]: 08:028:19:18:41
Block: 1185437 Fee (per_kB): 0.010000000000 (0.013333333333) Tx size: 0.7500 kB
Tx version: 1 No of confirmations: 2120924 RingCT/type: no
Extra: 01fff022d3b8a7a4f9df713fde51f94c1993c36ba869d40d864ed18dcdae8c800d020901bb2ecb4a4a5a0339

6 output(s) for total of 799.990000000000 xmr

stealth address amount amount idx tag
00: cc6dbd1db4021dc3bd1f80d57b9b5494fd0c20625c58b3441437cadd658b1d16 0.090000000000 283254 of 317822 -
01: 687b665a92160fb822d7ffeceec9b6c975791a7e092d6227863cbc7f3713de51 0.900000000000 427299 of 454894 -
02: 5815980337a9c33ea28f9a8e947983c8ac3e507991a023eda328ff500cf53d79 9.000000000000 228246 of 274259 -
03: fcc8a6d5ef61eea75fc08c65ee4bcbc3455c12d6488efc3f532d733ca8ba1671 90.000000000000 32075 of 36286 -
04: 1dfe8d6f71a9d4ac6a922949b78b8c31965ded61fe26807a37285d922b03ce29 100.000000000000 51411 of 57197 -
05: 5c8622a148d55b77fa6b1d291bcc8a6f1c47d82a70ee58ec0130b79e43f46c07 600.000000000000 6660 of 7310 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-25 23:24:44 till 2016-11-22 17:24:33; resolution: 4.28 days)

  • |_*_______________________*_______________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________*_________________________________________________________________________________*__________________*|

2 inputs(s) for total of 800.000000000000 xmr

key image 00: e4dc2ea4568ec961c93c2d191eafa1485d3b6809b3afec1a2c15e8fce8d58161 amount: 200.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9b97d90fc810ef2b1c773889c919a05c85cd2a3677981f2d3240d80b17174dbb 00320982 1 197/6 2014-11-26 00:24:44 10:026:11:54:48
- 01: 40fd40e14d3ea58bcb8b1f1e39ef6a72f45c589b61aa32fd9ddecc624d29e17b 00473600 1 217/3 2015-03-12 19:29:04 09:284:16:50:28
- 02: 00ba15ce320e899bbcbd028cf10333dd7626484a5548e14efd57f8b411954cbb 01185416 5 8/15 2016-11-22 16:24:33 08:028:19:54:59
key image 01: 74e74ce62a315a5255729325b7d819bb5e5b21294fe41e5e5d96448178468fe4 amount: 600.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ef3cd6930abb3145d79f3e8d685d0a86a020257ffaf958f18c049e4918a1dcd8 00735448 1 83/5 2015-09-12 01:19:31 09:101:11:00:01
- 01: a0802ea6d493307ba564cb709f102303c033867bcf0446d5b8adf9599c431a5e 01125751 5 37/4 2016-08-31 15:15:30 08:111:21:04:02
- 02: 09a5191f1ecde3ba9bb5de10822c99fe3dd69826c1315ac1cb33d47ddf6e38e5 01185359 5 9/11 2016-11-22 14:20:02 08:028:21:59:30
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000000, "key_offsets": [ 3859, 1956, 23249 ], "k_image": "e4dc2ea4568ec961c93c2d191eafa1485d3b6809b3afec1a2c15e8fce8d58161" } }, { "key": { "amount": 600000000000000, "key_offsets": [ 2090, 2940, 1608 ], "k_image": "74e74ce62a315a5255729325b7d819bb5e5b21294fe41e5e5d96448178468fe4" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "cc6dbd1db4021dc3bd1f80d57b9b5494fd0c20625c58b3441437cadd658b1d16" } }, { "amount": 900000000000, "target": { "key": "687b665a92160fb822d7ffeceec9b6c975791a7e092d6227863cbc7f3713de51" } }, { "amount": 9000000000000, "target": { "key": "5815980337a9c33ea28f9a8e947983c8ac3e507991a023eda328ff500cf53d79" } }, { "amount": 90000000000000, "target": { "key": "fcc8a6d5ef61eea75fc08c65ee4bcbc3455c12d6488efc3f532d733ca8ba1671" } }, { "amount": 100000000000000, "target": { "key": "1dfe8d6f71a9d4ac6a922949b78b8c31965ded61fe26807a37285d922b03ce29" } }, { "amount": 600000000000000, "target": { "key": "5c8622a148d55b77fa6b1d291bcc8a6f1c47d82a70ee58ec0130b79e43f46c07" } } ], "extra": [ 1, 255, 240, 34, 211, 184, 167, 164, 249, 223, 113, 63, 222, 81, 249, 76, 25, 147, 195, 107, 168, 105, 212, 13, 134, 78, 209, 141, 205, 174, 140, 128, 13, 2, 9, 1, 187, 46, 203, 74, 74, 90, 3, 57 ], "signatures": [ "3cb71d23f086afca888637ec543bdee388efa1368a3f9664aa06e606069fc20fa09f2ab5d5c25f7c3fcb8b43ef9eeea69da6b33f66495e4fde7636974cec34022e016767e981ec6d7301b344ec84a00584329dcd079eb55e844faa8b7770f30ff4997d66480db3e724048d20f07b57cdbbfa4da88ed0ab6894b3ef1adc3fac0604f998aea16d326ba4653fc9d1da1306301b90d6ef8c2b96f484fb3801b16d02a3e62c270fc6c27c39c6288c2bef0dd13d8dffa7cde872fb61b5c729198f3d09", "1076b416dc7efb89643985cd89818ca2ab35a1ea406e1dba6f78a6838fa32702177655610e0a2b460ee13a16a0c00cd83105151ab5b58f44769fb29045a42c0ae5708dd8252438066c39761d43c1b3418e23cfc13747eb6056116058a4dafb083735416c598c2867ccc0f3658f7c045c5c948ca4d280f2f59d0c11c431cb440cdc9853d432e8007025b0ceceb2b5356cee1208ce5031ce9ac3f33de23365e9067cdf893dcfe9f3aa2998a66879eeb966c393811d364eeca0c3e909b8e7e4090c"] }


Less details
source code | moneroexplorer