Monero Transaction bfb76d9607a34038f76226caaf4ef0ac2db5cb6203e07ed48a65aff101454b34

Autorefresh is OFF

Tx hash: bfb76d9607a34038f76226caaf4ef0ac2db5cb6203e07ed48a65aff101454b34

Tx prefix hash: f26b06f5e7ae7e6c1ba5e09ecc96fc4ec1afd6156e1f3f446fddebb4f9cb4f3d
Tx public key: c2c1dad0f6dc17269b27b21de7c2ddb59c73ae4e458ef25baa327e97342e0071
Payment id: 5b39969ba6526409b569e53e78b83ab92cdbe65d7e7491edb107ad32f8a21d09

Transaction bfb76d9607a34038f76226caaf4ef0ac2db5cb6203e07ed48a65aff101454b34 was carried out on the Monero network on 2014-09-26 23:26:32. The transaction has 3060472 confirmations. Total output fee is 0.183108802232 XMR.

Timestamp: 1411773992 Timestamp [UTC]: 2014-09-26 23:26:32 Age [y:d:h:m:s]: 10:071:18:04:51
Block: 235307 Fee (per_kB): 0.183108802232 (0.341536272287) Tx size: 0.5361 kB
Tx version: 1 No of confirmations: 3060472 RingCT/type: no
Extra: 0221005b39969ba6526409b569e53e78b83ab92cdbe65d7e7491edb107ad32f8a21d0901c2c1dad0f6dc17269b27b21de7c2ddb59c73ae4e458ef25baa327e97342e0071

4 output(s) for total of 13.911161240000 xmr

stealth address amount amount idx tag
00: 8ffe01ee5b470048e006834038db40d1381cadb654c2f601c9558f64e317b901 0.011161240000 0 of 1 -
01: 307ab82816e4c50d0faeab991994c68d4ddc02c349ac15ec25a5e5b9bde815e0 0.900000000000 128945 of 454894 -
02: 9a7ae220235b113fdf97de2ec7be02c3b7bae2bedd270830b410deb0cbf1bd8a 3.000000000000 64601 of 300495 -
03: e38fc16bfca138e2d44dd810d7980ddfd8f36fb9f92b78ea7fcba2eb2d2bdce3 10.000000000000 273846 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-26 11:22:13 till 2014-09-26 18:09:34; resolution: 0.00 days)

  • |_________________________________________________________________________________________________________________________________________________*________________________|
  • |_________________________*________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________*____________________________|

3 inputs(s) for total of 14.094270042232 xmr

key image 00: 7c132d4eedf927ee5c084ed9bb54820a6fefbcf2eb8016d675a60d94e63062cd amount: 0.094270042232
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d5fa73aa2e2b2385dc2ae4d6287f1a3fad110424175e56a36f6b9a233a9eb1cc 00234952 0 0/3 2014-09-26 17:09:34 10:072:00:21:49
key image 01: 3439740af8e2728ac8c0625a93d0db0a629c1365cc637c38cb5f2bbfa95d420e amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 928ac7e4f4be94a912ec8fb31edb54a3a340803fe7d746d127bb6ec52f5f0a55 00234616 0 0/3 2014-09-26 12:22:13 10:072:05:09:10
key image 02: 4635ff1ac73dd6b7755606fc4f537660a37c484ef373a023d9b2e47f6ace66b8 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5c5120c2889e77468cbbe9fc845dc3dbd14e914f4c23bdeb81b65c840e5ef2cd 00234939 0 0/3 2014-09-26 17:00:51 10:072:00:30:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 94270042232, "key_offsets": [ 0 ], "k_image": "7c132d4eedf927ee5c084ed9bb54820a6fefbcf2eb8016d675a60d94e63062cd" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 111126 ], "k_image": "3439740af8e2728ac8c0625a93d0db0a629c1365cc637c38cb5f2bbfa95d420e" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 273434 ], "k_image": "4635ff1ac73dd6b7755606fc4f537660a37c484ef373a023d9b2e47f6ace66b8" } } ], "vout": [ { "amount": 11161240000, "target": { "key": "8ffe01ee5b470048e006834038db40d1381cadb654c2f601c9558f64e317b901" } }, { "amount": 900000000000, "target": { "key": "307ab82816e4c50d0faeab991994c68d4ddc02c349ac15ec25a5e5b9bde815e0" } }, { "amount": 3000000000000, "target": { "key": "9a7ae220235b113fdf97de2ec7be02c3b7bae2bedd270830b410deb0cbf1bd8a" } }, { "amount": 10000000000000, "target": { "key": "e38fc16bfca138e2d44dd810d7980ddfd8f36fb9f92b78ea7fcba2eb2d2bdce3" } } ], "extra": [ 2, 33, 0, 91, 57, 150, 155, 166, 82, 100, 9, 181, 105, 229, 62, 120, 184, 58, 185, 44, 219, 230, 93, 126, 116, 145, 237, 177, 7, 173, 50, 248, 162, 29, 9, 1, 194, 193, 218, 208, 246, 220, 23, 38, 155, 39, 178, 29, 231, 194, 221, 181, 156, 115, 174, 78, 69, 142, 242, 91, 170, 50, 126, 151, 52, 46, 0, 113 ], "signatures": [ "e4e0f6d7e5b002c5e094f2f5ad86ee8b3ca8da08bdfe5339e28a6fb2e603b00aea7cd0ef8bc67a9349932b052e7f3da8e93ef5865f9a6a3a1caa37720881210c", "19fc1b45659b4a652d5713c46b7b731f526c8e6462033d790c72c555a7398401530d41c73f0179738cf39246e3b24d118f5591a2d0548cb59dbf72c8dfa54f03", "9032bebb5acac1255bd26d5c4ea02010a3a0715679b86837a9a0154d1662440174f128d5c17e5e4b5110dcd633c2d586a33c3771b47af921a72fe18ec2b76d05"] }


Less details
source code | moneroexplorer