Monero Transaction bff1f8ee750fd89355c5c0fdd57494948f85f6adb404a31596efc87627053894

Autorefresh is OFF

Tx hash: bff1f8ee750fd89355c5c0fdd57494948f85f6adb404a31596efc87627053894

Tx public key: 321ec78195798afb3e7df478bf6ede89dbb00c070c301c9b2c3731c8d7c01b66
Payment id: 80956ab50b01403b8b39d60cf1e1e0a19ed1a8376a6d4c5385869f47ed2674fd

Transaction bff1f8ee750fd89355c5c0fdd57494948f85f6adb404a31596efc87627053894 was carried out on the Monero network on 2014-08-19 05:22:38. The transaction has 3114232 confirmations. Total output fee is 0.005440700000 XMR.

Timestamp: 1408425758 Timestamp [UTC]: 2014-08-19 05:22:38 Age [y:d:h:m:s]: 10:107:22:52:14
Block: 179670 Fee (per_kB): 0.005440700000 (0.004148381832) Tx size: 1.3115 kB
Tx version: 1 No of confirmations: 3114232 RingCT/type: no
Extra: 02210080956ab50b01403b8b39d60cf1e1e0a19ed1a8376a6d4c5385869f47ed2674fd01321ec78195798afb3e7df478bf6ede89dbb00c070c301c9b2c3731c8d7c01b66

6 output(s) for total of 5.232559300000 xmr

stealth address amount amount idx tag
00: d06cd98642795a6645b863d4dc5563a93eb188a6df3fbea0f7442e552ccd4630 0.004559300000 1 of 3 -
01: aec6e209d8d0645359f9001291001d78a66e53db92cf62b6d8ff657e73d2ecc3 0.008000000000 169509 of 245068 -
02: dbb639feef4c437c5c4e61348fa0768a54d6e0230b11c773e79b8fefb8d4e972 0.020000000000 218891 of 381492 -
03: 77b017141e24d3f5eaa39cd993d613f4915be82afb362045ce5eda3a39500554 0.500000000000 236501 of 1118624 -
04: bb369c9439d40d5e9a356b99c8a51744d9d709d60e49ff2f4914eb90736a5244 0.700000000000 112807 of 514467 -
05: 671e3d82e753e80e64acf1c6dd5b6366da6711ccf27e8e980f94553535966c89 4.000000000000 47761 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 5.238000000000 xmr

key image 00: 45c5b1fc09ca418a4f76a77e3fbcac296499bbb4da9264d557f0d98011b7570b amount: 0.050000000000
ring members blk
- 00: 7bc504bd468162964fa194cb3ffb05b2f04de44fca5cb1f093d8f098e3b97a76 00060671
- 01: a7197f3d6d464d8c4d43981da3c8b4b1a5313db97ff029e5aaf1d697e82a770c 00179530
key image 01: 25dee0d676f11af17c022e63d130ca767755db7ac55672c5d5a89b6d0339d9ea amount: 4.000000000000
ring members blk
- 00: b904b802027a4e3a030b1e1965920cd6c20799c38c9d710a96d82604a7476fa6 00087542
- 01: 235e29b402a3f04f05bfdcf940ea482802c9779a14dbd9fbbba451c2f08311ea 00179202
key image 02: 24d209c9a4df0ec0295ff41ca3f3af3f67409de7836e730c0e3f913086f0c8f2 amount: 0.200000000000
ring members blk
- 00: 9161c3e433b21b4f5dca15f32f8ba0abcf8e431f039c11b7a74346827d55aa52 00072736
- 01: cefc424a78cbff749eba1d405cbdabc05732c1c7ac59b1395d8a7739a0a327f4 00179470
key image 03: 246945bc5095152ccd7b72b2eb4aea14b09c245173c07c52fceece252f174dfb amount: 0.080000000000
ring members blk
- 00: 524b894f9c965947444939d2509f76a133524c2e035638f0ba8ba4bb4c96763d 00072739
- 01: 1567f2a51a0187b403ced388e56469ac1289f47e5fb7c5b5ac5f412ead5c8b16 00179616
key image 04: fd5d824318f2183e4a2ad8734a25bea956674d2b4d3c2430010edc895c55994e amount: 0.008000000000
ring members blk
- 00: 6876a22b744255c6e13afe8ee7b8aa34a8fc8e39cb3afd54d5c8e2369380158b 00009213
- 01: fc2250e19a3daa306690f02d8de14d170010cd94b19cd73430af7b6084d62354 00179512
key image 05: b5b235b8dfc62920c44a41dd573b71a5547da4eb4353f3713dc4014f7dd61cc3 amount: 0.900000000000
ring members blk
- 00: 51c1152e21fccfd9be21919d899f887ea8494ef9a2b2329e0d5e282e6a9b66c3 00053211
- 01: 0da276ad85b3021d8564cc856ef60ed4e5c5326538b06a41ca90307c9555e2d9 00179357
More details
source code | moneroexplorer