Monero Transaction 28d63ac29438645739bf836bbcc7a8d80d92ebdc098d668f8c319773b5d4745d

Autorefresh is OFF

Tx hash: 28d63ac29438645739bf836bbcc7a8d80d92ebdc098d668f8c319773b5d4745d

Tx public key: 120d5e58b5aa5de8821ed06827de814ed10f8e9e7df4f1c85fe7c851ab635d43
Payment id: ef41948ca00064263e65f3c2f0020e2cd0265f55e396dd353e01c5bbc2a6e690

Transaction 28d63ac29438645739bf836bbcc7a8d80d92ebdc098d668f8c319773b5d4745d was carried out on the Monero network on 2014-07-26 22:22:51. The transaction has 3131817 confirmations. Total output fee is 0.005020110000 XMR.

Timestamp: 1406413371 Timestamp [UTC]: 2014-07-26 22:22:51 Age [y:d:h:m:s]: 10:109:06:43:36
Block: 146288 Fee (per_kB): 0.005020110000 (0.007872270505) Tx size: 0.6377 kB
Tx version: 1 No of confirmations: 3131817 RingCT/type: no
Extra: 022100ef41948ca00064263e65f3c2f0020e2cd0265f55e396dd353e01c5bbc2a6e69001120d5e58b5aa5de8821ed06827de814ed10f8e9e7df4f1c85fe7c851ab635d43

6 output(s) for total of 3.494979890000 xmr

stealth address amount amount idx tag
00: f1b39b6cbbab9d95e99e3a2adaba383b78384d5a4c0df5393068f3a7a0386912 0.004979890000 0 of 1 -
01: d6b675e112c590be8287045c1f0a3699f3a712c9f721e72e13d7cf85999e5404 0.040000000000 125223 of 294095 -
02: db1c0390159f273c191ee625d7c38e82c679e59e9e0fdc94647440e24d50134f 0.050000000000 109842 of 284521 -
03: c3787d1b4de9ec6f7ee1e168685abe7eba2f828a2c5128eed27a601c3645fbac 0.400000000000 115692 of 688584 -
04: 1c309ca81e7eebfc5687a421fe0057e9284e684807de046cf6484d8b3eac69c4 1.000000000000 138037 of 874629 -
05: f8fea1abab422af1c2a974c2e53e481b28a4483be2c1113c02ade5cbb974a356 2.000000000000 54817 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 3.500000000000 xmr

key image 00: 9b8ebe65f5cd1a3c0ea8b430b2784f400efb900a3cc7342719b782fa0e6b680c amount: 0.500000000000
ring members blk
- 00: 462addd9bd9d83aced65e34d388dc7b0cb5544807a3afc130308e3b22dda1710 00083202
- 01: 3856760de337dd8479554fcac014c2aeb7cc3d2726906478cc59699633ca0a00 00146177
key image 01: a3db395a1f943cad5840bb9b127b53a186f8c1ab05215cd56a7cc3a359e6f58b amount: 3.000000000000
ring members blk
- 00: 1507fb19283e725c2dfd2f6fb2d919c2476c4ac61b982af53871727f61633651 00092998
- 01: e36f280e04b4970cb185af5e7b16f0c416bc9744257605b6a044af7ad27fab8c 00146244
More details
source code | moneroexplorer