Monero Transaction bf8b94cdb3984c27c41baf9006943ed94f729e5d3c0c1887869d9632384cdedd

Autorefresh is OFF

Tx hash: bf8b94cdb3984c27c41baf9006943ed94f729e5d3c0c1887869d9632384cdedd

Tx prefix hash: d4ddd596f2b9e2aea098a421ad617b5f2cef9dde400ba27a7bccee5b95761747
Tx public key: d5b41a46669f01401fd3e608f51a197dd44de3eaa8850de4c9aad5b15510e621
Payment id: 3a4badd35426e4fd800b7a3e9b141c619545b2dac2ddfc6623bc49f3b81ffc65

Transaction bf8b94cdb3984c27c41baf9006943ed94f729e5d3c0c1887869d9632384cdedd was carried out on the Monero network on 2014-07-07 06:01:26. The transaction has 3160255 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404712886 Timestamp [UTC]: 2014-07-07 06:01:26 Age [y:d:h:m:s]: 10:129:00:25:28
Block: 117893 Fee (per_kB): 0.010000000000 (0.015609756098) Tx size: 0.6406 kB
Tx version: 1 No of confirmations: 3160255 RingCT/type: no
Extra: 0221003a4badd35426e4fd800b7a3e9b141c619545b2dac2ddfc6623bc49f3b81ffc6501d5b41a46669f01401fd3e608f51a197dd44de3eaa8850de4c9aad5b15510e621

4 output(s) for total of 2.790000000000 xmr

stealth address amount amount idx tag
00: 36d2a5c765062def739fb63c3816189f0d93e166dcbebc5267cf19651be12491 0.010000000000 310949 of 502466 -
01: f35442d3b00ae872ec920dbe7e21c0d62f830299b8394961067785c9fb115c77 0.080000000000 75246 of 269576 -
02: f73a29a7eb00bdbd2f5adabfa3f38b0973df7fd85c8f3caab2ecbdf8062dbdbc 0.700000000000 51090 of 514466 -
03: 0183b2c5c95ab047f144e08ca169a8fba32866929ff182fa97d019c2ee90b0d2 2.000000000000 33853 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-07 00:31:49 till 2014-07-07 06:43:15; resolution: 0.00 days)

  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |____________________________*_____________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________*___________________________|
  • |____________________________*_____________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 2.800000000000 xmr

key image 00: 1913fe0d90cd02fe5c54747d6b7fe1d9a24fe65a8affcff165b88a06a385e471 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e01591e919ee031b807121d283b30383b69897c30b343c749c67e7fe88aea0b4 00117736 1 44/77 2014-07-07 03:29:57 10:129:02:56:57
key image 01: 509dcb5a195706c753817db71d4b4125bef9e4da1185c31003081ce195481e7c amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5ff468c49dd3300030e40c3b118876c8c5ddf828ef3c07b6e26b1bd49934e67a 00117621 1 16/72 2014-07-07 01:31:49 10:129:04:55:05
key image 02: d3fd1940121199118cfafe724a83b32d1c48917c17ed15fe9f4f82a25e65b954 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0554980ff653fd22ef29131bff9399866b6c6681ee34160bbb9d6147e1f2a53f 00117873 1 16/66 2014-07-07 05:43:15 10:129:00:43:39
key image 03: 3826b353b67bf0ba98a80468164f7bd034f68d450f0717cca3552f973875b2b3 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 51a55808f85214751fc9c5fc0b98c934e0ae91b32e42af551c4497810a4e734a 00117621 1 16/72 2014-07-07 01:31:49 10:129:04:55:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 52313 ], "k_image": "1913fe0d90cd02fe5c54747d6b7fe1d9a24fe65a8affcff165b88a06a385e471" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 78994 ], "k_image": "509dcb5a195706c753817db71d4b4125bef9e4da1185c31003081ce195481e7c" } }, { "key": { "amount": 800000000000, "key_offsets": [ 52516 ], "k_image": "d3fd1940121199118cfafe724a83b32d1c48917c17ed15fe9f4f82a25e65b954" } }, { "key": { "amount": 200000000000, "key_offsets": [ 151469 ], "k_image": "3826b353b67bf0ba98a80468164f7bd034f68d450f0717cca3552f973875b2b3" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "36d2a5c765062def739fb63c3816189f0d93e166dcbebc5267cf19651be12491" } }, { "amount": 80000000000, "target": { "key": "f35442d3b00ae872ec920dbe7e21c0d62f830299b8394961067785c9fb115c77" } }, { "amount": 700000000000, "target": { "key": "f73a29a7eb00bdbd2f5adabfa3f38b0973df7fd85c8f3caab2ecbdf8062dbdbc" } }, { "amount": 2000000000000, "target": { "key": "0183b2c5c95ab047f144e08ca169a8fba32866929ff182fa97d019c2ee90b0d2" } } ], "extra": [ 2, 33, 0, 58, 75, 173, 211, 84, 38, 228, 253, 128, 11, 122, 62, 155, 20, 28, 97, 149, 69, 178, 218, 194, 221, 252, 102, 35, 188, 73, 243, 184, 31, 252, 101, 1, 213, 180, 26, 70, 102, 159, 1, 64, 31, 211, 230, 8, 245, 26, 25, 125, 212, 77, 227, 234, 168, 133, 13, 228, 201, 170, 213, 177, 85, 16, 230, 33 ], "signatures": [ "bb8388e51a99f03f09dd07947bd86744c4ed0731d10e7adc0483533314236605114dcd97175eabc317c371415b37c23cba51102467457d44175b42ef0e27cb09", "66400fec98c9f23bb29ef1da9eb33d993aafa194365bad372ef6532dc589eb056c8b52dde54c4979f64342eff89186caf950316881d160a51fa3efed5c5bb90b", "6af28fe53562ed70188b6fb2b4787fe64ceaf31691e97cccefaa6418dcdbc1023d737befc7b07c45316df2eda5660e1a6f89c17a25a89ebe323c3227f7af140f", "2adf17078e465c6c4ba2f4b532499cebe3a8099ed6ea9b7f9859508cb371b30a210db69f9531370df583e76d496289230246fb067ed1b7e38746ea2dd7ede00f"] }


Less details
source code | moneroexplorer