Monero Transaction 129f2113a020ae0bd0cd1148d86baadc451e7dd8f7adf94ec52a342b40de69db

Autorefresh is OFF

Tx hash: 129f2113a020ae0bd0cd1148d86baadc451e7dd8f7adf94ec52a342b40de69db

Tx public key: 51ecceaf6c40b2629913ead7ef05b9841b9691d565554c32bb33a1be134d9b69
Payment id: a87a0ade96ef304f04055b90cd893ba2a772aa4749e4adafc693b572e260df9c

Transaction 129f2113a020ae0bd0cd1148d86baadc451e7dd8f7adf94ec52a342b40de69db was carried out on the Monero network on 2014-10-24 10:59:36. The transaction has 3019478 confirmations. Total output fee is 0.111329986613 XMR.

Timestamp: 1414148376 Timestamp [UTC]: 2014-10-24 10:59:36 Age [y:d:h:m:s]: 10:041:22:43:19
Block: 274607 Fee (per_kB): 0.111329986613 (0.089624140166) Tx size: 1.2422 kB
Tx version: 1 No of confirmations: 3019478 RingCT/type: no
Extra: 022100a87a0ade96ef304f04055b90cd893ba2a772aa4749e4adafc693b572e260df9c0151ecceaf6c40b2629913ead7ef05b9841b9691d565554c32bb33a1be134d9b69

6 output(s) for total of 23.162052550000 xmr

stealth address amount amount idx tag
00: bc24f869a14eb500ffe0cd78b236b5c764c2f331e287a2ca36e3359bbe86a929 0.062052550000 0 of 1 -
01: 1c3f2fed4332cc015ea812190919ebb5dfc1d68f82cf0c5a928537a93ad12045 0.200000000000 579922 of 1272210 -
02: b86fadcfcd65334dd9c396eb2e170fc85f6f8647606fe049a502b89a6197dbd7 0.900000000000 150099 of 454894 -
03: fb7778242591deed47e128c1674f62b9d50fb03f9db7775626cdd5ccb1a34b2a 4.000000000000 127229 of 237197 -
04: abfe5f1ab0689dcd566458e623e26479e618953a596c430e9e4c6b86e11c37a0 8.000000000000 21999 of 226902 -
05: af4b971fd300e05c1bff215dc33ffb8e4124f38812ba16907218b730f600e0af 10.000000000000 319758 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



9 inputs(s) for total of 23.273382536613 xmr

key image 00: 95d3cb6691859c26cbb03897bee9fe5fd0bc7b3420cbcccf8f975952001ec0d2 amount: 0.073382536613
ring members blk
- 00: 86228a24c38096e668216729072a619dfeab5258d1f73c645b9b51362db1d438 00251905
key image 01: da911636f1718bb3065d6f01c4e5fb389cf2296f364235b6d8116c4845d24d00 amount: 3.000000000000
ring members blk
- 00: 0fc98aaa788c146e1a06050648bc33e1ca0c700313192385f6ed4bb6705eaf3a 00274494
key image 02: d2492fc714c1cef61b46c3e393b9d9ebb8ba9476efdbf8a2394f42e4c81b95f3 amount: 0.500000000000
ring members blk
- 00: a64fceebbeb13f87234a564eaddf6939de80f6d6c0df8ef274b8f58e39a03ad8 00274233
key image 03: a5c2a45f7d85d23a4580fffe341455bfbc2e8f3dde40b5998739493f6d28069b amount: 0.600000000000
ring members blk
- 00: a1c27b32ad03d63752f14fd3cb8d6ec57149b6d4cad06d8d1e666af32354c985 00274059
key image 04: 2cb252226c71ec638abeaa7131758b0f6acfcee88fc734d239c737b82907bd3c amount: 0.500000000000
ring members blk
- 00: 459c5d942b2dbc8bf1f5c45975f292884fe1997c490eb2d0ebd40a9c5971e88d 00273660
key image 05: 0e53ff4b4620b462b31511e4a5c5dd7b028ee60247793b4e49c180d62ab2ae4e amount: 0.600000000000
ring members blk
- 00: 7146bef02615f829b952b410069346b3ef3d0f8b27afeed43f5e12c1a8633c2a 00272613
key image 06: 37d6cec3af82c8849576910eebb6f84da22b537f7824dca3c09265576bec76f7 amount: 3.000000000000
ring members blk
- 00: c48d876658e6243d083c783cbbfd05cf3feeb114d04ace517fff89917505f7fa 00274275
key image 07: 8bcd2115a5ac54e014d704a0c9718c277575ebec170d9660b52dd437d66140b4 amount: 10.000000000000
ring members blk
- 00: 53d46c4928e80cc692d5396243c2ec79d23b1c86396e50927a25098f77c4c192 00274198
key image 08: 6c75995a3c60f0b5bd5703bf158ab168897e1fc1f45c20ff2cebf13785a530e6 amount: 5.000000000000
ring members blk
- 00: 46d9bfed03f18c3565279bb49df633335ea0ebf4a58ba385c1dbaf4729927b1b 00274320
More details
source code | moneroexplorer