Monero Transaction bfdc9c68ca3b346c45e66ba0ae414a3f62c280545f21709b1bd1c3b605c49a94

Autorefresh is OFF

Tx hash: bfdc9c68ca3b346c45e66ba0ae414a3f62c280545f21709b1bd1c3b605c49a94

Tx public key: a49d26689b6c669016868d4fc45caa0e7140369164b94513bd1dc8949cf20c0e
Payment id: 64f63c563473074f6d55f07829318fb1597dcdb92db77f92ef9b1aed89edaef1

Transaction bfdc9c68ca3b346c45e66ba0ae414a3f62c280545f21709b1bd1c3b605c49a94 was carried out on the Monero network on 2017-01-04 03:11:35. The transaction has 2078335 confirmations. Total output fee is 0.002813640001 XMR.

Timestamp: 1483499495 Timestamp [UTC]: 2017-01-04 03:11:35 Age [y:d:h:m:s]: 07:334:19:45:30
Block: 1216169 Fee (per_kB): 0.002813640001 (0.003479670726) Tx size: 0.8086 kB
Tx version: 1 No of confirmations: 2078335 RingCT/type: no
Extra: 02210064f63c563473074f6d55f07829318fb1597dcdb92db77f92ef9b1aed89edaef101a49d26689b6c669016868d4fc45caa0e7140369164b94513bd1dc8949cf20c0e

14 output(s) for total of 0.897186359999 xmr

stealth address amount amount idx tag
00: 17d31bc5ea136e92408049c19aeb8b9135d033d0fc098184ad743038e2846ab7 0.000000000009 14672 of 18592 -
01: b5c2c48f2026be2c22417baed7deb18c83048e1870a6a59e6dcbe3f308200ae7 0.000000000090 14790 of 18750 -
02: cb769892759ddd7d9372d488318575c00de33d07aa059194ad3804986ff2b13b 0.000000000900 15280 of 19294 -
03: 0e91baec02b87b9a9839aa24253184e02651009503aee8e4db724551e052fcf0 0.000000009000 15241 of 19294 -
04: eb0143dac4893001e834a994fea82ad22920513f0d14c57e294a1a2b0cf687d1 0.000000050000 18365 of 22583 -
05: 52f2b224f0bd984a9498ccd02d75e46bfdcb32589516b0c76b723a10230e3f56 0.000000300000 18434 of 22748 -
06: 396593ce0d16c7af541bb1c8f919da3af0733293a4e878ff7a38912ada74566a 0.000006000000 37942 of 42147 -
07: 029b2e0657f303ba8fa662438008417d1dfaed8c049dea09a7a45ae0162a93a6 0.000080000000 54754 of 59073 -
08: 31942b557a7e0fa47d6ebce6e8acc99740902d442fd3802f403845fbf8e35b24 0.000100000000 74198 of 79261 -
09: 3473ff2255f3fd09a3ddec0e46df81ad9c611014454ed7afdfc6cb38921d340e 0.007000000000 240336 of 247340 -
10: 38b76cc7ed204207fe93f48b8555109b6c034a27911c450a44551b01ab39636a 0.010000000000 492412 of 502466 -
11: 97fe2226c6e49822013a8b6d5f64e4451f1cb9c9a05bdc99ce7c46cb1bde8bef 0.080000000000 263285 of 269576 -
12: 58cbe512001d02871a6f6c5d98cfa21e26d72cba534d7ab80d0011c68059dfd4 0.100000000000 972015 of 982315 -
13: 01e8243e5c55b29ca31d6fb84824a7f67eae910100d2813b75bc4c4d74a074e7 0.700000000000 508901 of 514467 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 0.900000000000 xmr

key image 00: 3e4f0c26cd81a114cb8c4c758cbe0f92e89b236586409704efe011532a6a9bc6 amount: 0.900000000000
ring members blk
- 00: f8a7fd342ffbc1a6bf6ad588fbf14494dc9795b9f1091679a4d2cdc89702aedb 00408099
- 01: 8e6b7aa339a9c5ecbea4e026234b8dc8b06ada24c523f7ed2e425bf0b2d8f5a2 00910308
- 02: 9d629f0b15a965b80a6788900bb46aafa6904cf64c704a252edb81ae8f065b55 01215719
More details
source code | moneroexplorer