Monero Transaction 00542055f273e8c2fedff4acd8efd1d0c7305ef2847fb3a4973f9694434303e3

Autorefresh is ON (10 s)

Tx hash: 00542055f273e8c2fedff4acd8efd1d0c7305ef2847fb3a4973f9694434303e3

Tx public key: bbb55bff3717add94513aed403efd0a80b3fddfb51350797f0d7e7ebdf3a7932
Payment id (encrypted): 927b156e7174d170

Transaction 00542055f273e8c2fedff4acd8efd1d0c7305ef2847fb3a4973f9694434303e3 was carried out on the Monero network on 2020-04-13 14:00:42. The transaction has 1219900 confirmations. Total output fee is 0.000030700000 XMR.

Timestamp: 1586786442 Timestamp [UTC]: 2020-04-13 14:00:42 Age [y:d:h:m:s]: 04:236:02:41:42
Block: 2075864 Fee (per_kB): 0.000030700000 (0.000012053988) Tx size: 2.5469 kB
Tx version: 2 No of confirmations: 1219900 RingCT/type: yes/4
Extra: 01bbb55bff3717add94513aed403efd0a80b3fddfb51350797f0d7e7ebdf3a7932020901927b156e7174d170

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 6339c0ddb847f4802371080336a88e1e2e613235148e950ca6d2836a9dc4fe7f ? 16293883 of 120843176 -
01: dc6b0844198c6b09430af57b7c97b7c59f2b0961334ba17e825a437afa5a22c5 ? 16293884 of 120843176 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: eb4577bcdb9dc087460c700d1eb128ee1d67de69f32707230ef96e1edf6a39e5 amount: ?
ring members blk
- 00: 2ee838b3a92cb85df15736d8563b08d48458465f5ddfb8269bbad0de575d27e3 01504467
- 01: 1491a69b3b07c0a580095d132d40efb055917f824819d48181986caf4a7669ce 02051065
- 02: fe735bdc102dc4fd632d3a7e589b15d758e8b368b2f6bf932c58324f83f61b6d 02067623
- 03: 5b394785fd38ba9b3916bb521d260f50c618aac36ab8287353606e597227634d 02071957
- 04: a2d458eeadf46c23488804d3f340acc21e51af62b360ea2ce28b8e7a1a652c2d 02072864
- 05: 5380ea7c2708b40d4da2aa4d1c9da4501d67d2d4b701b594eaa8c2216dc3c899 02074831
- 06: f8f95f4f7259c993d94d32ced1d41a45b1dc35039f8577519a8744f5ea52f185 02075349
- 07: 2c68fccc8fb44f1811c0305e13044fcc3f2f185d9dd0855dd413cbfb79a0c362 02075510
- 08: 5757359e4f1b97cc99aeba7cea58bda491b5ffb0e4d09db334c582222bd22449 02075551
- 09: 6a0f58943544b8d21fd85fe63ff2b317b51156f38cea80b7c26ea0c7015f00bd 02075735
- 10: fd63e69d038d6f9808cda5bdc2ae09e5e6cc3edb0bfa4918dcb5a6c21eca5e68 02075850
key image 01: 51652508174e75d04e706b5da8f88ccbb3ec11e4a1655c5684a1d41a0b55ee30 amount: ?
ring members blk
- 00: e173829cf4eb4899501a3288ac5a7d8654745da5aeb109309b8af3135a2d6508 02011324
- 01: 0a5d073793429eedea56ea3f90eddb0dc686a6bba326148031ff333362a0be3d 02057042
- 02: 5fd859b0624da58609c9a74a71ee7eb2abada43314d70fd122072f89330bcd12 02065512
- 03: 7cf5583e107aeb76b9baffc833018b3799ad1031972d1bacf280d6748d226d1b 02066044
- 04: 7285d3580330b07d6135c79ff69abe08d55c8ced05dc9ef685c2bc4af346430f 02067680
- 05: d30e42cb4cbac96f60d21c0f5ab41dd5a6c0ca592988d2d64013653b8aa6faba 02072845
- 06: 219e68f5c5a32d8c75c9585d08335008572dbfaf074e82705b9bd85a2babb2c4 02075692
- 07: 847fd7fff05992dca2da8c64a56d5d35513c79f06ca7af923392348a80e51c7b 02075765
- 08: 972198f54a55a43996f02f5bacadcd971cb93e48d1a73d89cd1bec959f50eb0a 02075785
- 09: fdc18828505da3278377fe99ed95d33599bbca757671d2920b4f894ad7e965dc 02075791
- 10: ef111c533c0957e0b93ecd3623fd8eae2408bf0c9278c5f71224dfb897cbe551 02075833
More details
source code | moneroexplorer