Monero Transaction bfe904c65f5fb41b5c2f724a03970f37d6e4afdaf0739a1a27d3dc8f9ef7bd91

Autorefresh is OFF

Tx hash: bfe904c65f5fb41b5c2f724a03970f37d6e4afdaf0739a1a27d3dc8f9ef7bd91

Tx public key: 7f42ea7590539c3cc97267790be2ebfe08524e9bb5650077ea509403cc40c195
Payment id: 5bf6e4dbe272324faa0790d3e5c30a4e12ee328118ad62d8e701869a829497b1

Transaction bfe904c65f5fb41b5c2f724a03970f37d6e4afdaf0739a1a27d3dc8f9ef7bd91 was carried out on the Monero network on 2014-08-03 02:24:11. The transaction has 3085233 confirmations. Total output fee is 0.005426470000 XMR.

Timestamp: 1407032651 Timestamp [UTC]: 2014-08-03 02:24:11 Age [y:d:h:m:s]: 10:051:16:54:38
Block: 156587 Fee (per_kB): 0.005426470000 (0.003907668973) Tx size: 1.3887 kB
Tx version: 1 No of confirmations: 3085233 RingCT/type: no
Extra: 0221005bf6e4dbe272324faa0790d3e5c30a4e12ee328118ad62d8e701869a829497b1017f42ea7590539c3cc97267790be2ebfe08524e9bb5650077ea509403cc40c195

8 output(s) for total of 7.152573530000 xmr

stealth address amount amount idx tag
00: ff36fc79dea6782b024cae47ad1f26e8d003fd07e9dce6b21eedf644718e91cc 0.003573530000 0 of 2 -
01: 24bd91754660ebaa215b1805b128442c2abd071e228f23fa26fefcb1231ccc34 0.009000000000 156432 of 233397 -
02: fc1fbee6761c1c94725eb379121c053e62ac97d00cf5947fee4f18dbb6fc36dc 0.050000000000 113192 of 284520 -
03: 29dc9586be017359cfca5ec40a45164e50d9e605ea88d85e74d296e30670f71e 0.090000000000 96563 of 317822 -
04: 42dd8f8f606f15aa54892530bc8ad3a99daffe21a2c81e59484075feed95717b 0.100000000000 359654 of 982315 -
05: 5b3397a90e7dd02796cc2543523136ee9e1b8ccfbc5dbf2f6fc680932eb9f540 0.900000000000 74250 of 454894 -
06: 0b9f6f966134df47b05415690ffa10b826d121f30631d7b4d8220171db4aa3f7 2.000000000000 62986 of 434057 -
07: 71f66d2f3341f833e2a538d3cd059cdf34d61329a6b7e7fa2f0e5e0dbe87f151 4.000000000000 31612 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 7.158000000000 xmr

key image 00: 7e08e7e723f92ce90141ca8235278d3a220e88fb036a67b254afde84e1acd463 amount: 0.010000000000
ring members blk
- 00: fdeae1ef32315c1d5d398c32c03db32400303eac32944602ded3873d4f5adadb 00069016
- 01: 83b382f8db7ff73481333d3abdc5a910a026964451064ee78b13b9047b32aefe 00156464
key image 01: 104e702d4da5ff295f10abebf5c7b24de0205043467232381bfc40c0a3e9d5d9 amount: 0.008000000000
ring members blk
- 00: 9bec1a222d5173b1e262c7311a72a22f1b512ca564522c84dc626bdc56b3ccb4 00069069
- 01: cde2a65c47b23a16d3a37e5514f02a93a555b2eca02b197efd8fb0625e0aaf65 00156251
key image 02: f80db27f8f01b1fde05020cb0c2ec3cb1964555a7944570b1943ed1518eeb181 amount: 0.070000000000
ring members blk
- 00: 8ef4fe24f94ff5b760d98acfabeb6807bba549017e4b24378e432e45eef19b94 00057067
- 01: b865ce936f6ed91161ccaa0e790bad2ad7f52fa63ca8474a8d2e11da8390f9a4 00156524
key image 03: 1be69b49110a6375a43c7c0feb3e571637eba008fb84dead54ebd12a82dc9317 amount: 2.000000000000
ring members blk
- 00: 0172cba8f376f267c05fc870ae98eedaf5ab27fd654658a3d77d4ab331337f3b 00086033
- 01: 293857c7c78fa0640a47269fef4db14855210beec3e00d156be60a0808e3a552 00156516
key image 04: ceed4a9337f0ef0b9a67e9e317fc78fcdbc4a9277bbc26bab94104c7057f3a74 amount: 0.070000000000
ring members blk
- 00: 76a89c246fe32cf2a7f43b9a3c611277bbf26dbf0b69656d4a9c0e95e037ceec 00057809
- 01: 34f263e0c7d2e616eeb7f4360effb30d46f872ab67d1c412f65a76abae05c069 00156339
key image 05: a951443bd369b96fe07c416d21f2da2e6a93f11df3db0a32cc7c98fb5b144fdc amount: 5.000000000000
ring members blk
- 00: 9933b3c1cccb56c2ad25030e95ff3149cca534859b4706b88f04b6554ad5a681 00089362
- 01: 24c5fca915afe128b9193e88f6c025711785ea404bee7da804667891724e50b3 00156520
More details
source code | moneroexplorer