Monero Transaction 0af5023a8d42c48593a1943e0ea3d76c68e9ee39baf927bea179dbb16841d321

Autorefresh is OFF

Tx hash: 0af5023a8d42c48593a1943e0ea3d76c68e9ee39baf927bea179dbb16841d321

Tx public key: ea893df971723fc192c898bab0e8aeaf855071fa4b132775bfb274e277de909c
Payment id: 78145f7b690f30ac4043cf9c23b9daebc27cbc643d77e1c69d98681e7d4f9bd7

Transaction 0af5023a8d42c48593a1943e0ea3d76c68e9ee39baf927bea179dbb16841d321 was carried out on the Monero network on 2016-02-16 22:42:09. The transaction has 2336641 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1455662529 Timestamp [UTC]: 2016-02-16 22:42:09 Age [y:d:h:m:s]: 08:294:01:51:58
Block: 959311 Fee (per_kB): 0.010000000000 (0.010824524313) Tx size: 0.9238 kB
Tx version: 1 No of confirmations: 2336641 RingCT/type: no
Extra: 02210078145f7b690f30ac4043cf9c23b9daebc27cbc643d77e1c69d98681e7d4f9bd701ea893df971723fc192c898bab0e8aeaf855071fa4b132775bfb274e277de909c

15 output(s) for total of 0.990000000000 xmr

stealth address amount amount idx tag
00: 9233a35327933523f78e97d83408af9fe3f8617d1bfff97f982c1d8a907be97c 0.500000000000 949116 of 1118624 -
01: cab801580cd69f8f361bb75493583eb570b9b35bb9a75a2215fcf6f45385840d 0.060000000000 193303 of 264760 -
02: 7ab598f9cf9b4c122a5ffaf53817227f4feb3c96e86296390e9d53d9d5b5b11f 0.009000000000 182560 of 233398 -
03: fb5452f143195185baf84c5f594c6eec24c4643e8463116fce767e6d1187a8c1 0.000400000000 36034 of 77134 -
04: 5ed291a6027913900574fbadb91de8fff6d387bee338e8c44f34db1c11006ccf 0.000080000000 35956 of 59073 -
05: 9a46f51c688d860a4cc15584e7bf9bfb325fc2c68f5e0b1c227fab2ee11d5b84 0.000003000000 19475 of 42341 -
06: 3de4e2c4ebf9acf8a2c9ad3454f0e08947e89e806d5b573cad1a29e5f6100d97 0.000000570000 13 of 14 -
07: be33a5df4e3ce511ad4b97e5cb08b9d7025367bb337b4bc17d09d4f0274f726d 0.005000000000 246901 of 308585 -
08: 8bcc4938f3ca90f721fb39bbbdb8a1ee5e19edc562e0dde9214f8466b852045d 0.400000000000 556715 of 688584 -
09: e1ecee39f6b356ab7023374669b281127ce54d551028232cad72a52ff78a5334 0.010000000000 426381 of 502466 -
10: a8ce711bf027f57f35978d667b17f1ca62f07c921f0abcbbeedca6a46c25687a 0.005000000000 246902 of 308585 -
11: b3aa288de07d244aaf1f65b4bbd66c3206b16c654806804236e50ae306ff152d 0.000500000000 36294 of 77939 -
12: 005593eac7cf93ae736c40350e2f9925d9f605cca572251459eeb8a7965949ac 0.000010000000 36244 of 59775 -
13: 9a82545924dbbd9086aa426b7697e51f845fe0f66e32aa0126e890b83da798ac 0.000006000000 19524 of 42147 -
14: cd81f952b313835db9b257bea22ec8161109667001313b96b56d8e8143e0a206 0.000000430000 10 of 11 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 1.000000000000 xmr

key image 00: 407729b7029e12769509fc30bf12da510049bede463410f79546a404d81d49b2 amount: 1.000000000000
ring members blk
- 00: 4d6d6840650ef3c3787a47213f672ee8210102263641b46472ed78d38bfcb729 00255789
- 01: 95ef38404d514af6f6eb795726055c6a4739da39275a494829d86632d5661648 00440128
- 02: 6d7064df87bfd99bea67598fe616fc403500a93c54db6be7a4bc6980a57a7313 00468377
- 03: 93f48a45b5af138ac56379e2f43c0dfdf4645afd499efb056b6f3b3feeb7d417 00959294
More details
source code | moneroexplorer