Monero Transaction 134a3cd0ed1f06375ae3cd2b1b09c470393306aa74271cf1c8dd8951f8a6fc56

Autorefresh is OFF

Tx hash: 134a3cd0ed1f06375ae3cd2b1b09c470393306aa74271cf1c8dd8951f8a6fc56

Tx public key: c497bacbfacae9d74e88181690f212f31082938e60f0d6f5902ecd07a861dc02
Payment id (encrypted): 2a6be70d01f4ddce

Transaction 134a3cd0ed1f06375ae3cd2b1b09c470393306aa74271cf1c8dd8951f8a6fc56 was carried out on the Monero network on 2022-04-13 07:45:26. The transaction has 694344 confirmations. Total output fee is 0.000008500000 XMR.

Timestamp: 1649835926 Timestamp [UTC]: 2022-04-13 07:45:26 Age [y:d:h:m:s]: 02:235:14:51:03
Block: 2600861 Fee (per_kB): 0.000008500000 (0.000004427263) Tx size: 1.9199 kB
Tx version: 2 No of confirmations: 694344 RingCT/type: yes/5
Extra: 01c497bacbfacae9d74e88181690f212f31082938e60f0d6f5902ecd07a861dc020209012a6be70d01f4ddce

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: cb551b55fce3cc31bc878ef32c695953ea9273a2421798e9674d6fd2ed1a5805 ? 51441810 of 120783789 -
01: 4965f069ea059d2f7a241e06b047963d1f4a452412d2c8e70f97b7cf3327e1c8 ? 51441811 of 120783789 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: f6b7f8ffa779325a1e72c5f0d95f9c44850c5ea0edae1d0137fde50b4eee7741 amount: ?
ring members blk
- 00: 7e45966c96c8133f9f8b62f528447162da75f236f1e87e15b6636d70ced9d87d 02533873
- 01: c6fde64372255f85f8e3673e5fe3f90f57ca4991b04599af9cc114aae29efd7e 02550245
- 02: 26e29743fa2cb31661e7694d92b34bba5df7ed1021473456b499ac1f66f1c028 02600066
- 03: e662b36209193c18cbeeabd6f4394fb088cfaf87e6d424d896da1178951dfd7e 02600260
- 04: 87ee8c49748035685e724c6740c30e7db990fe9a91716c6cf98d8b42d72d535a 02600429
- 05: d459bea1252a3f22f9a800d2172d3dd5ea341b8db7cc02cef705763c2b8f27ab 02600497
- 06: 09ed96da3b7e0f220cb73e03ff338ea94c8a7b22a591b1261a17b5ed8166da93 02600542
- 07: 8e7ff548f07edc207c5cc3ebaa0bfacfcfaffa428e895f5c4830a81a71dc7107 02600574
- 08: c02671c177b839037408b9b31d77d4f4c626884e7333ea1164dc040a1209b10a 02600656
- 09: e5420cd732696b935e2e87fb8662c328f28f0ec0f91342ea4e55e09c02d4af74 02600666
- 10: 62e0d872f64738ada1a6fa2fd663fd7afeb0e9f08bfce8e7f84b3d96123f9e6e 02600851
key image 01: 97a8e891d03e41812ff857fc278ebfd2be724654d8b966499fdf8124c07962b5 amount: ?
ring members blk
- 00: 2b6d40ad39237ecf565c30d2edf0b4750475bf16363dac6b984775df0b24a686 02109833
- 01: ad52a869ebdbceeec832f12a431c70eb9c07e923deb543c59a6592168f54bdd0 02575475
- 02: 6caa04e66f334e66d5d4216e949afbc4235684513b1127ce793543d71869ec6d 02581695
- 03: ae0512f165e616e81f17242d85e0d1c467e8cf1aa42ea61b039f11e860e09056 02588119
- 04: 31d82dc16d80ca2c40e9961cff854d1e02dfdad3fc7f61b99bdffa06fc5579e3 02595642
- 05: 119cc004e79685bb5fd74fc412bee56333cbf787c6a04043333a56f93a2ea4da 02599318
- 06: 893e0d333e36c8f699a6ef0808323af61babbf72f03923dd8a2836a7d36e490b 02600454
- 07: e5ce927c9cc305dc81a2cecf086834fdcc129d3ee705f6e61057d329165983c4 02600602
- 08: 74cf771c3b2e17cbd4335f0750d0bf653eb849acb44f76b65228a83e98a7852a 02600754
- 09: d47989f1e95067fa18409a86b0d39ce02840f02ba515259131fbed552c62bcd2 02600794
- 10: df89c228cdc27f2d2bf1d2b830ae3f77cea28464a75303677f48e73ec084fb87 02600797
More details
source code | moneroexplorer