Monero Transaction 2056b20fcd823d3eae8b173311c61846fad6e2c117dfda2c87ab7ff6bb3fbc11

Autorefresh is OFF

Tx hash: 2056b20fcd823d3eae8b173311c61846fad6e2c117dfda2c87ab7ff6bb3fbc11

Tx public key: 0e808fd5444460bafa7f4099fdfa59449f62cd4299a9bd21fa21498d857c900f
Payment id: f8022b360db69af68a16205af8400d70b847b1d9e42cad1189b84aa1abd5a6be

Transaction 2056b20fcd823d3eae8b173311c61846fad6e2c117dfda2c87ab7ff6bb3fbc11 was carried out on the Monero network on 2014-06-21 12:03:05. The transaction has 3183128 confirmations. Total output fee is 0.016000000000 XMR.

Timestamp: 1403352185 Timestamp [UTC]: 2014-06-21 12:03:05 Age [y:d:h:m:s]: 10:144:23:34:50
Block: 95174 Fee (per_kB): 0.016000000000 (0.031326959847) Tx size: 0.5107 kB
Tx version: 1 No of confirmations: 3183128 RingCT/type: no
Extra: 022100f8022b360db69af68a16205af8400d70b847b1d9e42cad1189b84aa1abd5a6be010e808fd5444460bafa7f4099fdfa59449f62cd4299a9bd21fa21498d857c900f

6 output(s) for total of 399.990000000000 xmr

stealth address amount amount idx tag
00: 2247cfb7fe70b5d712ec257187dc48706c923e1dd7e9cf10644f555761348952 0.090000000000 61931 of 317822 -
01: ac43b9c336ddd00aa88f27a541aa55dfded3200548c86cbdec560285c61713db 0.400000000000 41754 of 688584 -
02: f08f1a98d6342fc3d28d1f8d4d9dc3ff6b38d52dababf0c2c12e9ac80c3118b7 0.500000000000 39666 of 1118624 -
03: 0d2b2f09d83dac662e62b29d9e2c354615a462bb29960df343580c6704f27661 9.000000000000 6924 of 274259 -
04: 43faa53d500c6162945d845f983ce1eede0984337bebf7ecfe2ebf6532da87d6 90.000000000000 798 of 36286 -
05: 9ac69eee91af85d257eb0e08a88b27b642e1046480f48d304cee67b814d244be 300.000000000000 370 of 16700 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 400.006000000000 xmr

key image 00: 87aae95192c3b3a3f1908037ca85d6f4bfc8bf145e3dac33debf39b016352a67 amount: 0.006000000000
ring members blk
- 00: 28084606c32eee927b589fa3e464368a0ea5b58064849ed6dc85b6ffadde18dd 00082814
key image 01: 51ad8b898a638f625baf9836f863c16b03cc59f8647457d0114a78ac7e475761 amount: 400.000000000000
ring members blk
- 00: 7c1e2b0bcfcf13fd5348383fe9f7230abaef30c5b9924525936db38bb3d370b9 00085073
More details
source code | moneroexplorer