Monero Transaction bff2edc030e345997430265732964b9f8ab9f9c268f1386a29c6c4ac9300edbc

Autorefresh is OFF

Tx hash: bff2edc030e345997430265732964b9f8ab9f9c268f1386a29c6c4ac9300edbc

Tx public key: 542585a8b57e1ccbc2d82236dad0a8e55e7b002be0ef1d32f2574293cc434b40
Payment id (encrypted): a4743ad0eb4fdb70

Transaction bff2edc030e345997430265732964b9f8ab9f9c268f1386a29c6c4ac9300edbc was carried out on the Monero network on 2020-10-11 07:12:00. The transaction has 1082988 confirmations. Total output fee is 0.000119580000 XMR.

Timestamp: 1602400320 Timestamp [UTC]: 2020-10-11 07:12:00 Age [y:d:h:m:s]: 04:045:18:45:33
Block: 2205830 Fee (per_kB): 0.000119580000 (0.000047023779) Tx size: 2.5430 kB
Tx version: 2 No of confirmations: 1082988 RingCT/type: yes/4
Extra: 01542585a8b57e1ccbc2d82236dad0a8e55e7b002be0ef1d32f2574293cc434b40020901a4743ad0eb4fdb70

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 71c11a63f05ace242c57e4651fb2e533a5ca8edba750478473029c0078faf731 ? 21702997 of 120131624 -
01: cb32c48f10c9b0bce4f4ab9be7f5020a5c5dfbf463f39af1704777ad1f47ace0 ? 21702998 of 120131624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 9de4a62c883e47bc215e30baea664f5053fb0377aaa078f5ba422d8c5ba7fd96 amount: ?
ring members blk
- 00: dfdbaa020b381fbba2426f829bed7bfdec43c0a78a3a39d53b39dc129cf72e1d 02197609
- 01: dfbc808b2933d30f4e457e9cb94b216bd6147c91f4dda204c9e4d739cb05e97a 02199570
- 02: ab3e3c19875049e0d0370c91d9327527ea4a2df3f0b8ca5cdc5c1340722b2441 02204769
- 03: b75062f03562e41f4b406e3ead5e947a31d42403e3e61b576c9c13f270209e20 02204930
- 04: b7089965511813b9e22c6e18cac5818a9b9b1138bfa988a13c1bba7bca9a2078 02205538
- 05: 7d6c1ac8c47995f6fe7467c55df9d4a6479b70e94772ed64596df4656ac46c2f 02205597
- 06: 4b9bf7fb296488ac0d64a0343a07ce28675ba1aa86fd54615a607d423cb91db2 02205615
- 07: 74e7dae492a97cff55cb37e9200f0d2cf38e60c732f6f5359fa84aa3e9d19336 02205665
- 08: e014b1a58cd6de55466df683c58b2c8203a65d566632f6f317859c1a33e7b77e 02205674
- 09: cb5bd4d5c4daa224a1494e010242c56676917841bebf7f21bcf1fbfa0cf65d94 02205676
- 10: db46366f97b0f215085d4b012e74f88f79b3b9ebdc8b633d3626196ec9224b78 02205789
key image 01: 0c91ed576277f18fbfcf6dfc9f10adb9101a8fe69274325e88bbb993a2859aea amount: ?
ring members blk
- 00: a06432310102d8f7fb95a53a7140436c129e1e233ce06b71791a769c0696938f 02182737
- 01: ae31da30924fcb295a4461315a82e53b00f08235be7ee0edc137a1482f6c2c9a 02194134
- 02: 8fefdb68f320cb64761a2b6f7a233e7bb41f8d09831972b535694fdb3b5f9429 02201100
- 03: e2a46e668ba40b9573e6d918e08aa2a6d684ef28ea44bcf2bcf43b72d8207b63 02202609
- 04: 44aa2d6769c0179dec543432378b101448c17ba1f98d88b4239ef0c962c66653 02203227
- 05: a4dc836822f8b3d8b999c41201e4df7151f724661597c02cb2426c7386e3d485 02205148
- 06: c33de8bd8b19885297b5e9dad7300de251dcb4e59bf6828972e03a1b9b551547 02205487
- 07: 1fb2098fc0a9a10dab9a3305b4933054c562197ad363fbd6d3662c3941da2a42 02205548
- 08: 25f79e758372fbf609122c86b5fc9c9526d25f827aaf96057d97269b469c82c6 02205742
- 09: 42e4491dfd5781d5d968222350fb688168a0bb2baaba0f17915636733d98b59c 02205773
- 10: 6924483af11433f62eab87346b93846650c36efeab2e97aef58670ee99a3359b 02205810
More details
source code | moneroexplorer