Monero Transaction 050d95ef3126f195d369007b38366b86f7efbe612e481c15964abf41ff2c521a

Autorefresh is OFF

Tx hash: 050d95ef3126f195d369007b38366b86f7efbe612e481c15964abf41ff2c521a

Tx public key: a43e1766e74c8ef6e4502d0410fd74e2add311fdf89b25587c9e78a34b0ffbef
Payment id: d7daadb32e6a85dcd9a5e08dfce56ecbb4dfababa7c0da627bae339409693d0c

Transaction 050d95ef3126f195d369007b38366b86f7efbe612e481c15964abf41ff2c521a was carried out on the Monero network on 2014-09-22 11:42:42. The transaction has 3145483 confirmations. Total output fee is 0.171905163414 XMR.

Timestamp: 1411386162 Timestamp [UTC]: 2014-09-22 11:42:42 Age [y:d:h:m:s]: 10:185:09:51:31
Block: 228842 Fee (per_kB): 0.171905163414 (0.185882668781) Tx size: 0.9248 kB
Tx version: 1 No of confirmations: 3145483 RingCT/type: no
Extra: 022100d7daadb32e6a85dcd9a5e08dfce56ecbb4dfababa7c0da627bae339409693d0c01a43e1766e74c8ef6e4502d0410fd74e2add311fdf89b25587c9e78a34b0ffbef

6 output(s) for total of 15.628608270000 xmr

stealth address amount amount idx tag
00: fad248a13d617aacd668cef84d1a970b7641bdde68d400c6f33b24ba1aa6f47f 0.028608270000 0 of 1 -
01: 7da11406326e2a1b2003714b71072f0f9d3579239400cf38af38615b99022c8b 0.100000000000 559442 of 982315 -
02: 17b4ce8d94dab095e01f7732a680f4c1b4729327a6a1c621f5bd09eed7c5ad6e 0.500000000000 334718 of 1118624 -
03: 7c72988605ed9ac1a521b5caa0f00f6c94790a97d0e87d824ee5cfbfcf09f945 2.000000000000 104851 of 434058 -
04: 403af701ec766a850ecd203b56dffcc2d7641bc7e6cc16cd09d776f831a01c53 3.000000000000 62969 of 300495 -
05: 40dc010409c40139ef7cc317acf6d4c561e0215c73574fdcd2c4cd28d716a7e8 10.000000000000 266180 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 15.800513433414 xmr

key image 00: 6ccc545f2fa0d9e2cd08b0e73736c731dde51b3c0642fdd966ce1caf1eca64fd amount: 0.000513433414
ring members blk
- 00: 9a66bf9751abedf785cf95b67ea6b4fa68de690ab03edb86ee09f63d5525d1ca 00181724
key image 01: ff35be316d70261cea52e65ceef6c88f49bedf20c855f04f646e7c9d51d19017 amount: 4.000000000000
ring members blk
- 00: 084ef63a4fd851538c1e1ea8bff3d730125da4fe4c127d179f2d0fc706f5ab81 00227823
key image 02: bdc667433c7934cf4c4364e1221b8faba969cc9d4c1cdd771b2b06e46edad5e7 amount: 0.300000000000
ring members blk
- 00: 7e4faaf6f0257677ff4599723ae934b1a44052640e5b547fe675c7210a137a6b 00228481
key image 03: 6b65455df4004b22adb504921e5c165293e98324955d50c5559a8da97f61a435 amount: 0.600000000000
ring members blk
- 00: 0bd67591c87ec52f14bb602b82b354194c0fc7ad9b756c2d7cb9e311fe40b966 00228707
key image 04: f8f9666ccdbd865dcf9be46b782d778573c0d6e340eabb853cbf7c8ef6bb2d56 amount: 0.900000000000
ring members blk
- 00: 9e8fa8c2406d3d0b124a4f3e9a23c1705742c314da755059076c4fffe676fac2 00228617
key image 05: 679c20aec7d4fd1b090d8a92a823fb1f55c9199282ed530394cb3a5bac6c1e96 amount: 10.000000000000
ring members blk
- 00: b42f1975d1910a54ef87094401ad761aa5cd43f9db67630af1d52efe49812389 00228572
More details
source code | moneroexplorer