Monero Transaction bfb04a31b21aad7e118a40d817e9173c58acaabf11787a4943fcc0183a3ddcd0

Autorefresh is OFF

Tx hash: bfb04a31b21aad7e118a40d817e9173c58acaabf11787a4943fcc0183a3ddcd0

Tx public key: af4dcf3dd663ccf1bff08d9f8a40629d5e834e71cf2217f45cb73b3102493e98
Payment id: cd8bbe5886bb2f50cbb853b530ad92c3977bc25c3508dd1a6e54811d3fc0414e

Transaction bfb04a31b21aad7e118a40d817e9173c58acaabf11787a4943fcc0183a3ddcd0 was carried out on the Monero network on 2016-07-14 09:38:30. The transaction has 2209917 confirmations. Total output fee is 0.027709060000 XMR.

Timestamp: 1468489110 Timestamp [UTC]: 2016-07-14 09:38:30 Age [y:d:h:m:s]: 08:152:12:10:22
Block: 1090965 Fee (per_kB): 0.027709060000 (0.022465619509) Tx size: 1.2334 kB
Tx version: 1 No of confirmations: 2209917 RingCT/type: no
Extra: 022100cd8bbe5886bb2f50cbb853b530ad92c3977bc25c3508dd1a6e54811d3fc0414e01af4dcf3dd663ccf1bff08d9f8a40629d5e834e71cf2217f45cb73b3102493e98

15 output(s) for total of 300.172290940000 xmr

stealth address amount amount idx tag
00: abdcf80a35155661aaf97ab4aab6501cde3a71a20617b437259b329747430a23 0.000000040000 3720 of 22714 -
01: 6716e8d6cea2f38c5245cf983f068c9fff9d06c1f1d24745cb616e22231aafcf 0.000000900000 4458 of 24137 -
02: 94ce29376c674ed6edc714d34ef1b4fa779e5b438a4dc6a21c8fe947e78551df 0.000090000000 41030 of 61123 -
03: b9339c633b3f4d59430476575acde6fcb338fb6d57663c813fd562116b6e707f 0.000200000000 46124 of 78038 -
04: c23adf1b5c6fcce8b0718539ab3e245123d7ccd60cce4ef8e146d72603c36810 0.002000000000 53403 of 95915 -
05: e31194a8a0b1b1094fe51ee9479c0fae72dee9b62acb42caeaf1a2406214c7fd 0.010000000000 444671 of 502466 -
06: 59d46f05beceb5c64a3e7fa74c2f867f137c7a20e547844c9d911b59a381224e 0.020000000000 327370 of 381492 -
07: 11f28be7ca66ad164958219f1fc2954b47adea19fd8ef477f2e28fb1977b0cc5 0.040000000000 243041 of 294095 -
08: 70f76d999b8d0f08513af1a44c261b94f84c2a9faf476f8bea9f0b21ddd88760 0.100000000000 897605 of 982315 -
09: ec17e6d54c4f76728673e7dc58c91cfa17ca7873200b4f8ccccfe21aa9ad119d 4.000000000000 202313 of 237197 -
10: 416c5daea23107bfce525001256a92ad2986d012489db1e035dc45a3d71bc658 6.000000000000 179264 of 207703 -
11: 8cf8996c5d38d991b1bde3cb2f79aec72d0a760bdd727bd518bf681c240695de 30.000000000000 34393 of 49201 -
12: 01e2a8d921d2c3ffab38ef0af50c1958d0105bf79d93697d0537233f5fd75db6 60.000000000000 16525 of 26317 -
13: 96123a6cde88932999855629e5f9ab6b863d674d0fc265f7f164945788643b36 100.000000000000 37793 of 57197 -
14: 4046abbf804c1e7f0b33fb02112a02b9bcbfdfe9a3abf428f29602ac7e35f3b4 100.000000000000 37794 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 300.200000000000 xmr

key image 00: 83abde5a9956b882f3ce65d653f813a5fdbf23e8507781a0e2edef41fbc8826f amount: 0.200000000000
ring members blk
- 00: 0343986a311c25268b0364bcd82014743ad065d0ad29173dd7aed8a50ed6f028 00103423
- 01: b3737310fa2e6fc35e699eb9a9ba20d5156ca16b9723fae92794dfb1b8d033b2 00161323
- 02: 5a6a47107b006aab3af3af6fc757f8387e6e3b0b141e951156d7b6f4cf9b8866 00302119
- 03: 61ae16acaab7f38eb77a54094b83f8c92842af77b84650e1136a16089dbf7533 01059861
key image 01: 3ff9355162e41a18bd2999e2e303650c46fa84200e728a5f71d52bea3c98ae25 amount: 300.000000000000
ring members blk
- 00: 21fdc376923212b3c18850617ccd5174dc3e32a589b55572b13f6c5e426572fe 00234178
- 01: b172930bf91681c2da6d22303cc2122f59555df10515998537496ad386f8e64f 00561686
- 02: f0185dca9468c4580168316c9321e182859bc8ff716a74d26cf99ad36f472a65 00800848
- 03: 087da8af81d0fa75d4f746f10469eb0346a186dcb0d91edeab4fb965ee3a8e7d 01086918
More details
source code | moneroexplorer