Monero Transaction 14e6f5aafd9cbfe841fbb138ab2b5961e2b6934d9503c3da9f7a6a40c94dd29a

Autorefresh is OFF

Tx hash: 14e6f5aafd9cbfe841fbb138ab2b5961e2b6934d9503c3da9f7a6a40c94dd29a

Tx public key: a44e828144b52c070fedbbf7cbf5029c782073f8f0da595a6a020f06c32c7bce

Transaction 14e6f5aafd9cbfe841fbb138ab2b5961e2b6934d9503c3da9f7a6a40c94dd29a was carried out on the Monero network on 2016-06-13 00:45:25. The transaction has 2239403 confirmations. Total output fee is 0.051932530000 XMR.

Timestamp: 1465778725 Timestamp [UTC]: 2016-06-13 00:45:25 Age [y:d:h:m:s]: 08:193:09:06:48
Block: 1068316 Fee (per_kB): 0.051932530000 (0.048256724791) Tx size: 1.0762 kB
Tx version: 1 No of confirmations: 2239403 RingCT/type: no
Extra: 01a44e828144b52c070fedbbf7cbf5029c782073f8f0da595a6a020f06c32c7bce

9 output(s) for total of 13.048067470000 xmr

stealth address amount amount idx tag
00: dff71456f1b5113efc28c0ab460ee1569e06d9d57ad082093730b76be7fd4abb 0.000000070000 2738 of 22271 -
01: ae912ebaf2d256a9da4b99f3e15449c833dd8fc157a2af07f071297c9efd52b1 0.000000400000 3007 of 22961 -
02: 9d17f08b0db3012b665411c1eec27f37df4dc599821b9f60bdeb55a4895c0bd4 0.000007000000 21473 of 41473 -
03: d4a61d0b38b10fdfdfbac632bd848f86a31f3015e0c38c8d273552a32370e8b8 0.000060000000 38209 of 59217 -
04: a20d3ce6200f25e6e37637007c100e6586d0dd35305c3cb585aaa6a6bc0b029b 0.008000000000 196268 of 245068 -
05: fef18a1aeb9d582ec8380670e39dd45867fe5219983a15b097488439fa9d4f8b 0.040000000000 238937 of 294095 -
06: 1c8aa058779a41d9b32c62a869799017459c21cb87dff01baa47c33d32dde164 1.000000000000 715755 of 874630 -
07: 30e5c6a4459b205c1fb28e3a38f4c7f5267d4af8548f5a02b6f5792425c0d4c1 2.000000000000 377115 of 434058 -
08: 821909cc48c1b1eaaa5df4f2d01bc380931298fb4a15f9eef13c307b88074078 10.000000000000 780126 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 13.100000000000 xmr

key image 00: d7a10467b41a735abb003fad99e2f4c478da994dd7491a5218ff70009543979e amount: 0.100000000000
ring members blk
- 00: 657f8d2cf281df4ce4356ffd1fac0baf39fc9fd37538ec9697c1bec0bf9f6364 00326202
- 01: 0d9675281a53b7036866f1a527db2efaf044e5ff423a67e288f283022094aba6 00327783
- 02: 0de8e91058e5c5148e9efd6a1dac03fbcd949cdcfd5c3968a5de3b3f535da4a6 01065662
key image 01: 0dfd342b617dfba951ba3cd79214dc33309e924c77ff7569456c7d377ea33e61 amount: 3.000000000000
ring members blk
- 00: 0fd01f8d41ccb0a409036d9c8366cbcc4040f2c4595e50df21c2a2f78e0227fa 00318464
- 01: cdf2cf2495aa236b236e67fb46986f28dba583ff1b87dc2281906e01a24e1cb3 00653505
- 02: f1f32f99da1c05548a12bd8fdfceb49619839175f0ea6399b3438ae6cd0957d2 01067009
key image 02: d219f6f950e7fbb10c63a79bf4967348aed265a0305caf8aab8d0719c3e90681 amount: 10.000000000000
ring members blk
- 00: 91a50c1c7cf4313aed2f7bc5bad1f72138c0f397a2ff2eab84bc3c67333c78eb 00515351
- 01: c73681b6640a1493f0a327c89872a88352920ae6e4b1d493fa8ede3b431cc638 00556587
- 02: 7f7d3e31e0b0bb5bcd2da9635e119b17726d2a97eb4a79856d4c0f2ab1ecc92d 01066914
More details
source code | moneroexplorer