Monero Transaction 05e1f32c3448ff1106ba8c6cb7706744629506202b4f4ee4399dd8f08d4e5c68

Autorefresh is OFF

Tx hash: 05e1f32c3448ff1106ba8c6cb7706744629506202b4f4ee4399dd8f08d4e5c68

Tx public key: f0dda0832eac772f81a30d1a14f90281447d0190bc7546e9d94ce3c281e8cf3b
Payment id: 5e93f22a6a468b2398fdbc03c19570ae17e28412e32d94a6c6d95bdbd1952f3c

Transaction 05e1f32c3448ff1106ba8c6cb7706744629506202b4f4ee4399dd8f08d4e5c68 was carried out on the Monero network on 2014-11-13 13:55:16. The transaction has 2991558 confirmations. Total output fee is 0.170658071906 XMR.

Timestamp: 1415886916 Timestamp [UTC]: 2014-11-13 13:55:16 Age [y:d:h:m:s]: 10:022:20:23:41
Block: 303289 Fee (per_kB): 0.170658071906 (0.197685368362) Tx size: 0.8633 kB
Tx version: 1 No of confirmations: 2991558 RingCT/type: no
Extra: 0221005e93f22a6a468b2398fdbc03c19570ae17e28412e32d94a6c6d95bdbd1952f3c01f0dda0832eac772f81a30d1a14f90281447d0190bc7546e9d94ce3c281e8cf3b

7 output(s) for total of 109.029341928094 xmr

stealth address amount amount idx tag
00: 532f665718c1f7007a165b3e13f6a54d4e372e361e637e3bbc225cec7f39d5a2 0.029341928094 0 of 1 -
01: 08d426ef3f0afdc2b8fd882248abc701b6369d8f0a224b9f156fd0f7fe402b9b 0.200000000000 616163 of 1272210 -
02: 10c0b01b112ab17dd4d63c4aa365daf6db1df566e6aabe14eb9f6473c2613071 0.800000000000 197834 of 489955 -
03: 7d02fd9051b9bb2ed9635968249b0c5624734379a47eeb68b005c4b68a55fcb1 2.000000000000 129232 of 434057 -
04: cfd9a76610ff975ad882651b93df85049628f700f012f5262426d61ed8c1903b 6.000000000000 88288 of 207703 -
05: 122cf1d56afddf5d16f7c003dda38686c1ed833ca627a7e3d7b478c83de85f14 40.000000000000 7569 of 41682 -
06: 0632141680d32d8490ef8865e8cee8f182557de5193b1292afe7355a98cee9f0 60.000000000000 3698 of 26317 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 109.200000000000 xmr

key image 00: 1e75ce7c7a10e58c9aa01762825f2cccd8ec3269c606d29372b45c3e717ef7e0 amount: 8.000000000000
ring members blk
- 00: 79a17c60f36cf3a0d48716810eef327398f7cf870bdfdf284158ee4bf9a71ff5 00302898
key image 01: b6f823a2a0a14aedfa58faa8d9e2c11184e6defa7ae8adad35a5b173ac3a7019 amount: 0.800000000000
ring members blk
- 00: 9f20e0c05215c1f4426bdb90bebbb075d6b749d40ce5112af5561473252701f8 00302957
key image 02: 229a983f5ecbec59e0dcda91222a175b5f651dc393dcac9290664f822d8937b2 amount: 50.000000000000
ring members blk
- 00: 3fa9e140e116238c605d94430ba1068cc4c8ac9b062ca2dbd082149df52eda53 00303040
key image 03: 588329aea9898791714355bc4a994164dbb5125015b72e00e6c58fff1b721353 amount: 0.400000000000
ring members blk
- 00: 4adb3fea73ab784f97960be0ee3d5a6cb92dff9a103c2ca7aa018ec13f81aa69 00302558
key image 04: 94b8293b7ebe2d2a73374bdb9b469d19280c66a1a3b397f9a3f67bbbfb473e6a amount: 50.000000000000
ring members blk
- 00: 849c1a232b99505ea031fe47ac2677a2b55a035a0dc61bbfedc3e46d931f94ba 00303040
More details
source code | moneroexplorer