Monero Transaction bfa06539d023c9eb155721f38851f7b8eaff0fa19536fd87e3eda193a800be75

Autorefresh is OFF

Tx hash: bfa06539d023c9eb155721f38851f7b8eaff0fa19536fd87e3eda193a800be75

Tx public key: 2c572e8a9d7b166bb2881b677135427709c31c007392ecc101d4ae4c48b7afa2
Payment id: 53cf4f08e1c64902b58618ed3dc501496823e2f973434b2d8e0ad8b3367e2064

Transaction bfa06539d023c9eb155721f38851f7b8eaff0fa19536fd87e3eda193a800be75 was carried out on the Monero network on 2016-04-27 17:03:02. The transaction has 2323946 confirmations. Total output fee is 0.050841160000 XMR.

Timestamp: 1461776582 Timestamp [UTC]: 2016-04-27 17:03:02 Age [y:d:h:m:s]: 08:310:20:17:54
Block: 1034987 Fee (per_kB): 0.050841160000 (0.061176671962) Tx size: 0.8311 kB
Tx version: 1 No of confirmations: 2323946 RingCT/type: no
Extra: 02210053cf4f08e1c64902b58618ed3dc501496823e2f973434b2d8e0ad8b3367e2064012c572e8a9d7b166bb2881b677135427709c31c007392ecc101d4ae4c48b7afa2

14 output(s) for total of 999.949158840000 xmr

stealth address amount amount idx tag
00: 033d7a3ca5d815d8c0d2f1bfb7df5da23a8d35d07329ba5eceab7299547d34f1 0.000000040000 2044 of 22715 -
01: fa30bc5889d42940ab90582ccc4155a280fffc3ba4301dc992931b10c211e21c 0.000000800000 1922 of 22876 -
02: cdbc1869664fab041fcb2212b91e66e178c34322fcc115849249a2c6d63c654c 0.000008000000 21425 of 42741 -
03: 7af1d96b0cb564e3c847691955edd9f6bba8f4f98a414928e4cda0ed1196d81d 0.000050000000 37234 of 58905 -
04: 7e4e105e82b5eea6a8e6bd5884e5f4e7b1e20907b605246450e92738e018172a 0.000100000000 40313 of 79262 -
05: 6aef0157c8cb96eb350ed3f9a85f6918928b4919382a0f2b0f52b16774791b58 0.009000000000 187781 of 233398 -
06: 1d58cee6a4ee1cbfe901f15c0614ee422602cf4c990de507e9616c0989713ddb 0.050000000000 220933 of 284522 -
07: 5faba0c94ffb36edb17deb501dc690321a83a6283b7aeae753b00220f3ae0070 0.090000000000 231114 of 317822 -
08: 64bf77d435c40d95534a6bc652a8ae827ccd13f0a42f1f43b33d1e9e314161c0 0.200000000000 1114336 of 1272211 -
09: 5100143ff731960fde295ca9a0153f3566d2f5b31d246b7ee6ea2207c12de5c2 0.600000000000 564862 of 650760 -
10: f7c58e9a0695b887da7621cd606cdd341605beb9af7c4efdee0baa8e3073e341 9.000000000000 180411 of 274259 -
11: 45b59b87f6047455a65abc55867dfbbe4c4400455c94cdec0c1f4ad36c6591dd 20.000000000000 53610 of 78991 -
12: 1c640f0eadb237374027820933af09d8ac5baaa91c1735a873b277b64cba4d16 70.000000000000 13803 of 24819 -
13: befbb99d73c8d70ae1483ac9bd5d1fdae06bee8374b44e9b2e273b25a3f283d2 900.000000000000 3615 of 8187 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 1000.000000000000 xmr

key image 00: 116f8dd0555869f1cf56449e1e5ec381ab396f30a49358e0b57dbbd294c06e62 amount: 1000.000000000000
ring members blk
- 00: f103ffd50c860237be2ba361ce17567270665ffefd07a1cd5b51af87937a96e8 00499817
- 01: 6f2fd6220cc5b510569db77bb556e30668c63e5c4a202ea90f965e56285bd31d 00682318
- 02: 7cd0b3f3d0b0b5f2fa1af672c474e8b484de12507adec74307562f28ef3ed4b0 01034754
More details
source code | moneroexplorer