Monero Transaction 0fc2f2299cf293e5d1d18d2745be891e5a1fc8895a8fed6ed3ae9fbb9a0ddf2b

Autorefresh is OFF

Tx hash: 0fc2f2299cf293e5d1d18d2745be891e5a1fc8895a8fed6ed3ae9fbb9a0ddf2b

Tx public key: 5a6857c0c35a35de2bc37bd98da6ff546440a208e90ccf1bc6752202983ec3e2
Payment id: 8ebb12774df369541e090eb5b87080b427a2c5cfab553da3b22eb56a775cdec8

Transaction 0fc2f2299cf293e5d1d18d2745be891e5a1fc8895a8fed6ed3ae9fbb9a0ddf2b was carried out on the Monero network on 2014-08-31 13:54:55. The transaction has 3089703 confirmations. Total output fee is 0.170259797359 XMR.

Timestamp: 1409493295 Timestamp [UTC]: 2014-08-31 13:54:55 Age [y:d:h:m:s]: 10:086:09:13:27
Block: 197567 Fee (per_kB): 0.170259797359 (0.206571128549) Tx size: 0.8242 kB
Tx version: 1 No of confirmations: 3089703 RingCT/type: no
Extra: 0221008ebb12774df369541e090eb5b87080b427a2c5cfab553da3b22eb56a775cdec8015a6857c0c35a35de2bc37bd98da6ff546440a208e90ccf1bc6752202983ec3e2

6 output(s) for total of 33.902354120000 xmr

stealth address amount amount idx tag
00: f9ad37ce807e845fb866c6ad75eef2333263f98e78a2a383687a2dd0ea3ecc55 0.002354120000 0 of 1 -
01: 63934a34f16bcf58ae9bfc08c354f1fd4e1567776c896cc46004a2c8a666b258 0.100000000000 487989 of 982315 -
02: 635c4fc2400448b5be133215488ed3afb7f5e5eb878e6d94acefdead92e8a452 0.800000000000 140481 of 489955 -
03: 059a562172eee7273042d8822d3cb07d553847f7a9f841580c1d3e8424a62c1c 4.000000000000 68825 of 237197 -
04: 1b465920de1dcb949ff6b543093da29a4df2a5c197c7595c528368aaaf98b24a 9.000000000000 18648 of 274259 -
05: 5d537ffbe048ce0c07f23f634a4d04f4d22f9f32af4bf5841757b75706928fb3 20.000000000000 11558 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 34.072613917359 xmr

key image 00: 2bc0d9d1b8f9d23e8b6e1353c04ee46cf430b54109820cb8820da8896606077d amount: 0.072613917359
ring members blk
- 00: c50067bf0dda98ef8b9248078c8e1f028e46fd572b06779e34c497f106efd514 00187723
key image 01: 5878ed65367f0161032d5ff1ef4340c20c3a3ee3a3e5ff63b995f842483420bd amount: 4.000000000000
ring members blk
- 00: 0afd384e89636e495caf1c5f34e06494ab992d3a5a74e0c164ecbaba52a0d33b 00197141
key image 02: 7d0ebfbb4f50b72d460e26a388699bd05f409842dff80bf4d87f88cc9a786fae amount: 10.000000000000
ring members blk
- 00: f2a0e488cd53fa1626815e9afbe126b8e549282f4904472d2c730588b040b0fb 00197489
key image 03: 3a849abd9bcda9f1aa4b78121b08c844d0058c0a877f96aefb8fa6a234e610fc amount: 10.000000000000
ring members blk
- 00: 7cf7ef78e4381ecd663477dc2bc6bb506184fe301c68d62bf41c79abf9340e56 00197390
key image 04: 47c8036a69332770525806318a3efe0aa546b60f01191fb4e73805ab8a73280c amount: 10.000000000000
ring members blk
- 00: 28788acf0f074a9646bbb9d683e07cd1bd0783e38f9ed86cf66856ac4d6f3803 00197361
More details
source code | moneroexplorer