Monero Transaction 0ef2bacf80b7d72d6294961fbe26b3e7994e4f4755ab276bab44e66eb5796516

Autorefresh is OFF

Tx hash: 0ef2bacf80b7d72d6294961fbe26b3e7994e4f4755ab276bab44e66eb5796516

Tx public key: 6ca616096908836d8ac90b0389df69ef2c3177f6c9c29044a78c1bbb1323b2da
Payment id (encrypted): a86dc73df38f27c8

Transaction 0ef2bacf80b7d72d6294961fbe26b3e7994e4f4755ab276bab44e66eb5796516 was carried out on the Monero network on 2020-08-27 04:58:13. The transaction has 1118020 confirmations. Total output fee is 0.000025440000 XMR.

Timestamp: 1598504293 Timestamp [UTC]: 2020-08-27 04:58:13 Age [y:d:h:m:s]: 04:094:11:12:03
Block: 2173372 Fee (per_kB): 0.000025440000 (0.000010007899) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1118020 RingCT/type: yes/4
Extra: 016ca616096908836d8ac90b0389df69ef2c3177f6c9c29044a78c1bbb1323b2da020901a86dc73df38f27c8

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 4c2a3926f171b740f810477f0823a9e581318f709d8dee9009afd1ca5ddc9259 ? 20195698 of 120393196 -
01: 05fcb332197dd391f7021086a60e64eccad1c836e3d2de5ef7c3678088149530 ? 20195699 of 120393196 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: c972a56341142ec9fe30275f730bc1267565078f8f2d447c4ddd0631b9076256 amount: ?
ring members blk
- 00: c383fde1a3ac2ca9e95a6d7e59ca342b704c9a4f43ded702b9e6fc2b06cb3e19 02129994
- 01: 77eaa8a346b376068f014c428e115d053a6faf807cb53f6707e1efe20ba21798 02143238
- 02: 3966d391c8ac9123d521506c013dc7bbc162c7ff5506f02fda85e7a3f3d520cb 02153785
- 03: 75b42ad396cc67ad6bb4b728e5fdfb502c63941353ff138e960e080d7ef206ac 02169763
- 04: 8450e9f8f25688afc8cd372d5ec6dd88e3e3dbb97fc25dc25febb92c02a53956 02171238
- 05: 5c321fde5a6d720fbfb52afacf99e62d4ec34765b5cf3ebdb21fa23c84feef34 02172769
- 06: d7e8e9d05d2c02fc65676da6814fca0079ceb41f616a0fad3a350de0aa4995ad 02173173
- 07: 5472fd0e9a8aa6039eab4ad3760909b515deaf03fb93ac33ef0f3a005d2f82a0 02173329
- 08: c8e40c7e2e91229092a9938afcb0b98d992d31022305f5f1734980041c1ca0ae 02173329
- 09: e18f559bcb093039cf48d536c8d1a78e70473be4fe15154326c55de510e3d27a 02173340
- 10: 1671a46906da776d94ee099d5547a098d1574d34d842cdf50ade4f031f753e37 02173362
key image 01: 1537ce04523244b7ad696aac93de9a06c198f838adc03a8b358f1999766786d9 amount: ?
ring members blk
- 00: 2256e9c8bf109878c6e60c1434bb4ff6801fce8feb8d71f2c13d6dae29054f16 02138679
- 01: f78c3fa1a3c25abb1abe58db4ffa966d8c8f5f731e9cde3b90b9e3372c1ad0f8 02166926
- 02: bf9597af1da8d05975569f55d7ca2de168917c83bd3e1dff2859a03e0e839abc 02172107
- 03: 4f022b52fdb84f210fa747022fcefeaee937d05472a28a4f2d1012bc5b113ebd 02172303
- 04: d368e8f9de983846f5ec56e30e331863068d70e29571e40ec1ed0775a21e2c9f 02172464
- 05: 3790f426320ba6574c2574189cafb3e85ae4a6ef3e5eff04f1a96ccd80eafab7 02172793
- 06: b7e667b179f3d1222c22b8da9cf8c744082558b95bf77a218ef6a4c98758b11d 02173145
- 07: ed88a425b8cfd184d3f3f534c964f1194f35e29ab9d73512ba6917cae6c8a5ff 02173294
- 08: 8cbe935b5e9981cdb6427e4a79bbe7c54d2716a1cb98f13144a09a7cf6641d0f 02173329
- 09: 0da8423e94b2a749b6e4c066e458e5e7ca15c9e16db5dd058d76da6afa9a2abb 02173345
- 10: 3b9356f8c329d3507126eaf8498b9b1e178aa527a4826c3b423e040ebacd7866 02173351
More details
source code | moneroexplorer