Monero Transaction 004de64ff142c34a0d378c7bb8f8db6f2c9e8b9f02ad9bcd809f2613d33ab4f7

Autorefresh is OFF

Tx hash: 004de64ff142c34a0d378c7bb8f8db6f2c9e8b9f02ad9bcd809f2613d33ab4f7

Tx public key: 1fe29a78dd79fe50cd3521e2692172491af0315ecdec30c9fa1d2adde734e5c5
Payment id: 516b018ed7f92eb1032cae47231fbb3e69ff0c3dd2400d4daf221ab60cadeb6f

Transaction 004de64ff142c34a0d378c7bb8f8db6f2c9e8b9f02ad9bcd809f2613d33ab4f7 was carried out on the Monero network on 2014-07-15 05:30:22. The transaction has 3112488 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405402222 Timestamp [UTC]: 2014-07-15 05:30:22 Age [y:d:h:m:s]: 10:070:13:09:58
Block: 129308 Fee (per_kB): 0.010000000000 (0.005496511004) Tx size: 1.8193 kB
Tx version: 1 No of confirmations: 3112488 RingCT/type: no
Extra: 022100516b018ed7f92eb1032cae47231fbb3e69ff0c3dd2400d4daf221ab60cadeb6f011fe29a78dd79fe50cd3521e2692172491af0315ecdec30c9fa1d2adde734e5c5

2 output(s) for total of 7.400000000000 xmr

stealth address amount amount idx tag
00: e337a3a460389c2df3f16edfd3a62fbcd08676a58230c0072a700236e422d008 0.400000000000 86090 of 688584 -
01: 2bb9437efc7fa5f27982ad7eb432eb4c28630fc4d548d1b2492fff8227cc79a9 7.000000000000 44631 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



16 inputs(s) for total of 5.700000000000 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: c36644394a794d135e3866d45232c6836777dbc61312b06c93a1ed205c753b14 amount: 0.700000000000
ring members blk
- 00: 08dbd71a578399be341c681d5176cde82997d53a9f0002be69c11f3598c9b3ca 00127506
key image 01: f69316bbf0f72739f51cc3a4bb200a9e0c107216e4d20fdd53a7753323a93390 amount: 0.500000000000
ring members blk
- 00: 4af7de55468e6ad24996da45f4de9a52bfc26ecc425f41711934b7f434dfecf3 00129216
key image 02: 35cbfe4a0b81226af9084e649ecd446e6cc2d24e14abe08cbac717ff4d048261 amount: 0.400000000000
ring members blk
- 00: aac3688dde16f2dcecddd4385a4699bb71a63130c98215cb88995ab9d8de5d6e 00128955
key image 03: 9c18d46156acfb465a9bd2c768cd382534b98fd72270f51b62873022c4e0ec8a amount: 0.500000000000
ring members blk
- 00: 63051c9214dfe4ebdccb5ec869ba5de4c64d86b0f162b1c9c8c45ae27f817006 00129195
key image 04: 85d84dd7e8f07c20cda8d160de4d2de20292c16d47e9888a5ea9595722d0e145 amount: 0.500000000000
ring members blk
- 00: afc6c10c4307c56ac781162f828d84e189869ff9fc33e3be18a6dea99c36431f 00128215
key image 05: eead8d81254704e18255b7852978c0cf8ab87105aaeb88958d16627413d857fc amount: 0.500000000000
ring members blk
- 00: 8577fc4340edf2bbee835e530b6f2b961d2a9748efdc93e89ce81eebc9fb1d24 00128243
key image 06: 3cec77df4a1751933a5a3c599a9926d1d3ae2f5fef86dd77c48b18c763ccb0db amount: 0.600000000000
ring members blk
- 00: 2055a10871fdbab1be618dc493021d5e5850f8b4203918b2d6e2e2df78193d43 00127206
key image 07: 410ff59e6f73078868abb5a75fbdca3c4a5dbeb618fc7c2631bdb78e4fd33dcd amount: 0.600000000000
ring members blk
- 00: 02f430713c3162256d769eac00e2b5abe32bdc8072e0d8f8d45c87e76febccd8 00128740
key image 08: 236981cf48060b9b5e3124b5b88c8badb4ab4a83f141e545726e1abf1086f2f6 amount: 0.400000000000
ring members blk
- 00: d83ad6c6572239fe7c95b7c07045f2a516b3b2650e78d28a4c9217269a7b0f84 00127102
key image 09: e140827819d7731104ad68d951697ce8672a5d6b251512d88d5c3bc4d03c6d07 amount: 0.500000000000
ring members blk
- 00: 6a28a63b7a59cfa60d298f3beafd7ea5e5f1a00b5b492c3334a3b30e90a0276d 00128863
key image 10: ba2c22e9577ec80414d0a5690d76d27be7774493dfa0833f7a67c0cf3f15642e amount: 0.500000000000
ring members blk
- 00: df3dd3f0bc202d01f49c96793546fe7c8adf0915c66f756ee875d392057d3cc2 00127805
More details
source code | moneroexplorer