Monero Transaction 0b04cd19b2b4de2a5a90e9f2364d1c66554aabd3575ef61845ef565928a614d0

Autorefresh is OFF

Tx hash: 0b04cd19b2b4de2a5a90e9f2364d1c66554aabd3575ef61845ef565928a614d0

Tx public key: bd62b107a28102d18684567803bd525842f4d3b9a67179735d7206dd12f16c32
Payment id (encrypted): 05d84ad105023612

Transaction 0b04cd19b2b4de2a5a90e9f2364d1c66554aabd3575ef61845ef565928a614d0 was carried out on the Monero network on 2020-07-10 09:41:14. The transaction has 1152840 confirmations. Total output fee is 0.000027180000 XMR.

Timestamp: 1594374074 Timestamp [UTC]: 2020-07-10 09:41:14 Age [y:d:h:m:s]: 04:142:22:26:49
Block: 2139043 Fee (per_kB): 0.000027180000 (0.000010684192) Tx size: 2.5439 kB
Tx version: 2 No of confirmations: 1152840 RingCT/type: yes/4
Extra: 01bd62b107a28102d18684567803bd525842f4d3b9a67179735d7206dd12f16c3202090105d84ad105023612

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: cb2d780d88fba1ae411d63b219d354864bdf0f69a8d77334a8bcacf0bf29c4d7 ? 18886680 of 120440141 -
01: 2a0d33b72134e1f1f69d74c4eeda25b5dc71ab737e66f0f4ecbadd83cc10ed52 ? 18886681 of 120440141 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 95caba7e328f92170a0eec3a62b32e9aae64a27242eacd9fe3c4541b9a27ff04 amount: ?
ring members blk
- 00: 5936b5db7a7e2e0546a490eef51016081ee9d1f3a043838c8e7f13691c45fb56 01582917
- 01: 907a8565938c222909fed5fcc8ec010b7ea41be50f51966c400e3c137ab05561 02136831
- 02: b10953f2ed94f934766a67311bdd5f743a93fe45f6fdecb22279ac750805b4c9 02138402
- 03: 078268e854099f34a28c9d4c920c26a8274815681a65cedbebeb6eaa060e20ba 02138432
- 04: 17882516e095e2a885ab187c94eae2709c49069a86911f3beec595fbe847a297 02138695
- 05: 9cda5203824f573816bc494c763725927225b103b840e3d7f6123ecf78e1720d 02138742
- 06: 15a19507defdb74d90fe23f02a1680f735a11c0672273b82484a9daed8b512e2 02138823
- 07: 5625d19d8168dff69ab5685d91b7bb6b1b07360ac2e365fe5c07aab901b4fc0d 02138846
- 08: 3936ebb63148c77db39ff1e71d685a65b22797f81f846fa0d23b220a9cc563f5 02139005
- 09: c8f39c574bd72f23cc042091466dbeb25f82035ba8ba959ec6b146621f36bd47 02139020
- 10: 6f3d4e591343db0b28ddc7144110030387aed887dd130ab0201583a8cd277e47 02139032
key image 01: 827adde460fb7d105dd62cd28f5c9fa66ca64098cb7f74ec7e1c5409451648e2 amount: ?
ring members blk
- 00: f5739e48a4dc1a1727f5a0d0d4f14b7588991ea38310dc415f6f5cb0fe911eab 02106662
- 01: 2827f54763c6e2c232a64e20fdcbcfeaa3ace8c02b3b83c921089feb0fa251ec 02110452
- 02: 19c9287857e250286d1d6999bcf06a114271fc06ac84e5d3a00b3a668b5e37b5 02133544
- 03: 8dbaba193e0cc6a2426b500c1856f13ab495e7f5763d3884a8e7b3bb0c828d77 02135183
- 04: 1e7fb9f5b673812224188d4a29a35404aa169b025fec8dabdd1675d9e73d84cb 02137266
- 05: b6992f1d14058a114646b9add75bd627ddc1678a751afc9380c5944596ecf904 02138068
- 06: c2550805c6d3115bc5e44ac60deb8c644affc6721659897af8dfa135886d940b 02138546
- 07: 5b0c3f94802ad02a061f178361d5a14eb9824d4b26729e6173bbd3ea66276f2b 02138577
- 08: dbd0a45157732f7b4c40e636037ca49853171f19258556be4ef7169c0674ec7d 02138986
- 09: 8052033e334a554a8d3f5d3ba62b39d93d36ac45c9d6b2f6fb6a601e48d37512 02139005
- 10: 9ee35796e23316a4eb7d8f0e20eaed897e7bcb1384cbab7b7e7d53dea66d802c 02139020
More details
source code | moneroexplorer