Monero Transaction 19cffc45ca028bb5caa53f729fb6c51a44dedfd189542e3f1ccf2f498b2b5d51

Autorefresh is OFF

Tx hash: 19cffc45ca028bb5caa53f729fb6c51a44dedfd189542e3f1ccf2f498b2b5d51

Tx public key: b8545929617c7ecb489471a9db9e0795732c79a8eea3fc5cee6e7cbf18f690a6
Payment id: 90f3de6c2e98f9c93d7670a56cc427e9e371ba69523f76f396567a9faeef6759

Transaction 19cffc45ca028bb5caa53f729fb6c51a44dedfd189542e3f1ccf2f498b2b5d51 was carried out on the Monero network on 2014-08-21 00:03:12. The transaction has 3120427 confirmations. Total output fee is 0.007432820000 XMR.

Timestamp: 1408579392 Timestamp [UTC]: 2014-08-21 00:03:12 Age [y:d:h:m:s]: 10:118:09:52:19
Block: 182216 Fee (per_kB): 0.007432820000 (0.007086785549) Tx size: 1.0488 kB
Tx version: 1 No of confirmations: 3120427 RingCT/type: no
Extra: 02210090f3de6c2e98f9c93d7670a56cc427e9e371ba69523f76f396567a9faeef675901b8545929617c7ecb489471a9db9e0795732c79a8eea3fc5cee6e7cbf18f690a6

8 output(s) for total of 9.918567180000 xmr

stealth address amount amount idx tag
00: cdf436bce3cff11af2d3ff97226add315379d52d2336ea3f51c2afd93681770d 0.000567180000 1 of 3 -
01: b7230bf758d170e81e0c08a5ad9dd490a40a60156005f86c55d9f9e0cda2e8c7 0.008000000000 170509 of 245068 -
02: ca2e8d0580b60dfadd3e0a655ab2c099ac810e3215c3a2557c9d016136651fbb 0.030000000000 167209 of 324336 -
03: a27998127b5bc19c635e8e5e8e54dfb7f16590e6bcddfb07b2b1ac8a513e92a1 0.080000000000 95944 of 269576 -
04: 6a56bab8d6808408e4c917c4b820177d01a1c5ce2933ea677db55542d435c42d 0.300000000000 173525 of 976536 -
05: ed045585fff919278e1c0d23dbeb66b7137b4d307b76a40ca8221e525fc37872 0.500000000000 241221 of 1118624 -
06: 8d5c24fc016f404177636be6a348dfca95775f4c11545b35a37443309c1b1e1e 3.000000000000 48567 of 300495 -
07: db4f0691237b257cb79a4c834a69f8b66871a0c36f9e11b84a6a9b28ab5597a2 6.000000000000 77007 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 9.926000000000 xmr

key image 00: 34cad43c17e189dd02f4894b89bc520b5f81876aff4fa60497e00395863afa49 amount: 0.006000000000
ring members blk
- 00: a491a3ef0bc371033e4fda7a52e10aa9d0a7238bb8aa99935f90ed6334f2229f 00052943
- 01: fc4589e85a6ad402c2a5e21946539100c03f854fbdd73787195275288ba0109b 00181812
key image 01: 61ccac726914ae7af9a05603c0d3eace47934e66b6905c94a2529de462eaab33 amount: 0.900000000000
ring members blk
- 00: 22692a5dbdebf270f89a3840dfb7663dc3452dfaba0f79bce9c896043567205e 00037226
- 01: 94a57109575da3a943ee0548a608ed19f7714426cb4c026e1cb1701f464f5a5f 00182199
key image 02: de2a660cac403d7911b5b4a5ddb8b859b76bb0b456913abe626b7584a82e13b5 amount: 0.020000000000
ring members blk
- 00: 5bd263484e0c2302ecd1a5aa3fc6c008f9a217158d39ce9088345af927b8b51a 00086380
- 01: 0706f42b5f8820175be2c98f5727c2eb37694e01f7759d9b2bdd83e989802dfa 00181736
key image 03: e4a691f152a7d0b825a01785a34c5a1630aa0428185eb9441a659ca1495af620 amount: 9.000000000000
ring members blk
- 00: 5e70fd69ccb098a4fba8824108077fa74163d6d027f3b10c98551335f92907fc 00140676
- 01: 49efdafbc150ab29b8a61d50f26ba2abe57c5beed243038b6ac247479159d394 00182175
More details
source code | moneroexplorer