Monero Transaction bfb3ddba52c03114be44d56ae65507eef956e66b67039336d39446ffb4dd5170

Autorefresh is OFF

Tx hash: bfb3ddba52c03114be44d56ae65507eef956e66b67039336d39446ffb4dd5170

Tx prefix hash: 3dcfcb6a7bfbd4f833878263cb4f336fb88410beb9905f3368dca5e59a18a6b8
Tx public key: 335ee18c22d9905415e315dca5ddd20cebf748422c10d2f64815193f62d0433b
Payment id: 6d5d7bafdf2c2f040f08eec48ff7a115230b5a408e9c91af0b6b68f539baa128

Transaction bfb3ddba52c03114be44d56ae65507eef956e66b67039336d39446ffb4dd5170 was carried out on the Monero network on 2014-12-02 03:02:00. The transaction has 2960190 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1417489320 Timestamp [UTC]: 2014-12-02 03:02:00 Age [y:d:h:m:s]: 09:362:09:22:15
Block: 329633 Fee (per_kB): 0.010000000000 (0.027161803714) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 2960190 RingCT/type: no
Extra: 0221006d5d7bafdf2c2f040f08eec48ff7a115230b5a408e9c91af0b6b68f539baa12801335ee18c22d9905415e315dca5ddd20cebf748422c10d2f64815193f62d0433b

5 output(s) for total of 59.990000000000 xmr

stealth address amount amount idx tag
00: 50fa2405acdc47c9cd991ee8843bbb5d1cc7a4977f07d47fcf105108243dfda6 0.090000000000 125040 of 317822 -
01: 967b70ea7416a14aedc60468eb4463d332a6931445cd150dd665f8c9da226e5b 0.900000000000 174029 of 454894 -
02: 9a57717442b52124e4498ca9efd6036009266253127239cb4b1136f3c6351508 4.000000000000 134878 of 237197 -
03: c9adea0494c7ecb70f8c3e3454428beebae2a00a14dc0a8219bb8519161df857 5.000000000000 129493 of 255089 -
04: 48f35b1174ecdbb6d002980901990188f6d2786cc12d4b4d48b87a4e04355ae8 50.000000000000 9569 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-02 01:38:17 till 2014-12-02 03:38:17; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 60.000000000000 xmr

key image 00: 7286018561709fb8e666219041f7d305237ab38cfea539d0913100810f6fc65b amount: 60.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 34c0e89d5d5032b9dea9a83feb383e137152af1b8f6fe89f0cb586077f9ab17f 00329612 1 5/6 2014-12-02 02:38:17 09:362:09:45:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000000, "key_offsets": [ 4374 ], "k_image": "7286018561709fb8e666219041f7d305237ab38cfea539d0913100810f6fc65b" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "50fa2405acdc47c9cd991ee8843bbb5d1cc7a4977f07d47fcf105108243dfda6" } }, { "amount": 900000000000, "target": { "key": "967b70ea7416a14aedc60468eb4463d332a6931445cd150dd665f8c9da226e5b" } }, { "amount": 4000000000000, "target": { "key": "9a57717442b52124e4498ca9efd6036009266253127239cb4b1136f3c6351508" } }, { "amount": 5000000000000, "target": { "key": "c9adea0494c7ecb70f8c3e3454428beebae2a00a14dc0a8219bb8519161df857" } }, { "amount": 50000000000000, "target": { "key": "48f35b1174ecdbb6d002980901990188f6d2786cc12d4b4d48b87a4e04355ae8" } } ], "extra": [ 2, 33, 0, 109, 93, 123, 175, 223, 44, 47, 4, 15, 8, 238, 196, 143, 247, 161, 21, 35, 11, 90, 64, 142, 156, 145, 175, 11, 107, 104, 245, 57, 186, 161, 40, 1, 51, 94, 225, 140, 34, 217, 144, 84, 21, 227, 21, 220, 165, 221, 210, 12, 235, 247, 72, 66, 44, 16, 210, 246, 72, 21, 25, 63, 98, 208, 67, 59 ], "signatures": [ "709baed63852e562bb29af266aa6c0a13dd16e5de9c055197b2509b6fc83c70708f06287a3f0acc52138154101c9eec518171df529c1ffd8fcb62190363b5c03"] }


Less details
source code | moneroexplorer