Monero Transaction 1fd1319aff431f111e5c0d4b7bfe750a74ba0420cb4cae35b5fbd82ef26ecb79

Autorefresh is OFF

Tx hash: 1fd1319aff431f111e5c0d4b7bfe750a74ba0420cb4cae35b5fbd82ef26ecb79

Tx public key: e263595e44e5488d2503a2d52d5ed4e33ba14d9d008d1301ad1789ec806457c7
Payment id: 3d05df36b78e9062a557e4d2b5faea421002e142fb39d428ad7ba9006eb6ea9c

Transaction 1fd1319aff431f111e5c0d4b7bfe750a74ba0420cb4cae35b5fbd82ef26ecb79 was carried out on the Monero network on 2016-01-14 20:47:33. The transaction has 2447556 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1452804453 Timestamp [UTC]: 2016-01-14 20:47:33 Age [y:d:h:m:s]: 09:051:06:12:04
Block: 912529 Fee (per_kB): 0.100000000000 (0.155151515152) Tx size: 0.6445 kB
Tx version: 1 No of confirmations: 2447556 RingCT/type: no
Extra: 01e263595e44e5488d2503a2d52d5ed4e33ba14d9d008d1301ad1789ec806457c70221003d05df36b78e9062a557e4d2b5faea421002e142fb39d428ad7ba9006eb6ea9c

7 output(s) for total of 3.960755737930 xmr

stealth address amount amount idx tag
00: cb2bca10cb9d39a6cde6962e9bfe3bc2be21a361ea9dcf0e586fb96f56f7d18e 0.001528826541 0 of 1 -
01: d874d3ae79620cf9aaa77963113e5109387f6663f6c1f5790187ab77a9a13fdc 0.090000000000 210713 of 317822 -
02: c7582b7e4be3213cc93a1257efea1454b89302619e0651efaf78f1e2ba0a4103 0.000226911389 0 of 1 -
03: 49892fda2afc0fa6e0ea1d327bb7d6b1cd13da7b6a2a498714a9068287d965ec 0.009000000000 180910 of 233398 -
04: 552104592eba727a0972d0d069377ef80c8dc5f59e6302605fc05a3ad2da0eb1 0.060000000000 186182 of 264760 -
05: 5b8dacb8a20832a2e76bec20a0bea1518ece651013dfe059126b0303a0fdb1ed 0.800000000000 376186 of 489955 -
06: f1fb6654d9d758f0592980346318b846d1518197b3063ecaa762eeba610042ae 3.000000000000 224719 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 4.060755737930 xmr

key image 00: 11c57e002203cfc8bba33338810ddec6cff1c43169ce88da61d82e9f7d228826 amount: 0.000755737930
ring members blk
- 00: 61a7acd5c84054718f92d95fde5a094d31e5f7e2c302c222b7c8ef516247c4ba 00902018
key image 01: b62d1bc9aea6383eaba6402ae05fdc5a58547ce26577160d36a3abe5a511c4f1 amount: 0.060000000000
ring members blk
- 00: 69c9359ab96483540ae39b0c7477d971a54efa8c3c38fb5ffe2fb831af9d1fbf 00911068
key image 02: ce6bc8ddddfcc0b580f9208d81493eaf988b06d931a5990da4931aff4093bfaa amount: 4.000000000000
ring members blk
- 00: f37258d5cc0995a7745461d0991ac1ab5480e5e49c6f306378e15033c95dee95 00910840
More details
source code | moneroexplorer