Monero Transaction 145012aff8699a4078223353f1807dad477dcdf1b96b5afc7a4da25cb0ad62d2

Autorefresh is OFF

Tx hash: 145012aff8699a4078223353f1807dad477dcdf1b96b5afc7a4da25cb0ad62d2

Tx public key: 0edf9d3ed731e6123547682c1f960e166d2eaaa265ab086872356c8ddfcb0474
Payment id: ce19a16459a98d43fe4213d85b562ad9aac5a9ad1f05624ba701a3e62740fd5e

Transaction 145012aff8699a4078223353f1807dad477dcdf1b96b5afc7a4da25cb0ad62d2 was carried out on the Monero network on 2016-03-10 12:29:29. The transaction has 2300057 confirmations. Total output fee is 0.025862620000 XMR.

Timestamp: 1457612969 Timestamp [UTC]: 2016-03-10 12:29:29 Age [y:d:h:m:s]: 08:265:02:10:10
Block: 991278 Fee (per_kB): 0.025862620000 (0.024341289412) Tx size: 1.0625 kB
Tx version: 1 No of confirmations: 2300057 RingCT/type: no
Extra: 022100ce19a16459a98d43fe4213d85b562ad9aac5a9ad1f05624ba701a3e62740fd5e010edf9d3ed731e6123547682c1f960e166d2eaaa265ab086872356c8ddfcb0474

14 output(s) for total of 70.474137380000 xmr

stealth address amount amount idx tag
00: 3c034673f5fd3bad5db45aecbc6203983e44825edf48371291f882ef7bea8a98 0.000000080000 836 of 22809 -
01: 9d14f9b2ff8d5e34cd039a1639e514be5b6a636895e7179e16133a72427faafc 0.000000300000 849 of 22748 -
02: b9f9b48eb09aac544c14ef9df15c6aa55e4cf4dafd2f51fb260eefc4b93e433a 0.000007000000 19501 of 41473 -
03: ada34b1f7eef8ca4d95e38736f9645cafdbf1e128abccc9df9de68d43f71594f 0.000030000000 36255 of 59484 -
04: 3cac8402775fd286f8e1f5e586c1b5fdb6e62e0afc665b72e046610c137350ee 0.000100000000 36890 of 79261 -
05: 0fd3ae540cfe812ea46a96b5f5ba9a8f6bf1dba7ac23067209bc8a298562900b 0.004000000000 37183 of 89181 -
06: e43ad1e5707c03417fbc4323cf7cef285c89b5e626d5f43aedc09348ca17a284 0.030000000000 255897 of 324336 -
07: bc0e9120a8806feb9be16227399418844d84e7d9be76ac5e337dd473c58c0ea3 0.040000000000 225755 of 294095 -
08: 57bc0c97c662bce363d5fd05f4076d69199c03fd6208962362aa2690c7444f86 0.500000000000 960353 of 1118624 -
09: ad41f56fc4416c11a95b306814ac8694b399756c1513a58ab1e9426f43e4c1b5 0.900000000000 352361 of 454894 -
10: dc0da00fea7bbc88b30afd57901441cac50adc3373bbb7cbed536868ac4be1e0 1.000000000000 689360 of 874629 -
11: 48504e85780b87f082b2abaa3686b07ea49d7bfae5b0c6acb686b66cbce09fb8 8.000000000000 187722 of 226902 -
12: a16e84795864938bfbc2b166bdff4f388205f438e4216b2e0cdec39886e51c65 10.000000000000 711303 of 921411 -
13: beab325a496905b6944133ca418ca1a8b3d22e04fb8e2d8f63d1974776161a25 50.000000000000 26313 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 70.500000000000 xmr

key image 00: c993cb6849179576f10797c64ce709169778604e5aa3f62a46bf1517a7387d92 amount: 0.500000000000
ring members blk
- 00: fde96c441636597347349fad64f35f0cf6d9a66234b313f368b535bc0f7a3dea 00133909
- 01: f2f6e6b8acc1121e09c23cfc841ed28ee862e6a1c4670e1de168f3900bb14bdc 00546876
- 02: de66b8438caa8af58779142795194baba8799421d68fb0b0419d58cd33c45bc9 00899962
key image 01: fcf583677b209ae723dd97ceb072c8c67e0267bec3ece0d9c51d41c3bc734052 amount: 70.000000000000
ring members blk
- 00: 9419eeb7d8306c02882335ca02e6002f97fa45b6a91209cfcc901ea986fbc554 00745999
- 01: 411b4420911c040398e60fe4ede6e820b61296452f75181f8271174100a8e91d 00770339
- 02: c00f9c389c7065da195dcf3da31c447eb9b7cee5d96ecd541869a2a0d5d57405 00983559
More details
source code | moneroexplorer