Monero Transaction 2a69dc685247a71b2f83871942e060bbd10ae067afedb83dffef97a78a908ed8

Autorefresh is OFF

Tx hash: 2a69dc685247a71b2f83871942e060bbd10ae067afedb83dffef97a78a908ed8

Tx public key: c816a29e390382cbfff2996c49f22e939cba7125c49f6bb0960795501e1e7089
Payment id: ebb502201f4dfb574eb6967b91d12a0d0cf0810dd6d5b6c95bb84763c02acc5a

Transaction 2a69dc685247a71b2f83871942e060bbd10ae067afedb83dffef97a78a908ed8 was carried out on the Monero network on 2014-08-05 17:39:59. The transaction has 3140719 confirmations. Total output fee is 0.006388280796 XMR.

Timestamp: 1407260399 Timestamp [UTC]: 2014-08-05 17:39:59 Age [y:d:h:m:s]: 10:131:12:03:12
Block: 160388 Fee (per_kB): 0.006388280796 (0.012579999106) Tx size: 0.5078 kB
Tx version: 1 No of confirmations: 3140719 RingCT/type: no
Extra: 022100ebb502201f4dfb574eb6967b91d12a0d0cf0810dd6d5b6c95bb84763c02acc5a01c816a29e390382cbfff2996c49f22e939cba7125c49f6bb0960795501e1e7089

6 output(s) for total of 2.063611719204 xmr

stealth address amount amount idx tag
00: 6897325a0cd589a0bb93bb16ab096fd3abd88792ba0ec9048d56b19262471f86 0.003611719204 0 of 1 -
01: dd35c7a4087d3b55b8d1149b285f24d495a526f124c871687f936d2742803ac4 0.070000000000 92266 of 263947 -
02: b9b7b2d135563bd56f8d8d437cc8d87287a78c5eb60ea0093b5a7dd4f192fba8 0.090000000000 98374 of 317822 -
03: 21b1e4a4d579835c4bdf1c2e21897008d9d7327338a02aa06a44128c06eeafcc 0.100000000000 376689 of 982315 -
04: d49f2987fc30f33914e2898d3cad50b5ce8789b45c9342ba017b3f72d9f6341c 0.800000000000 100063 of 489955 -
05: dc33577ef20fedd1ff9a30e6da62891ca575ff547f0fba6c6fd4f87f6d9be2a8 1.000000000000 167857 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 2.070000000000 xmr

key image 00: cf92cc87ce196703ed716980f302f3bd3d01ae67c89b8031a70cb61505c591e5 amount: 0.070000000000
ring members blk
- 00: ed825031c075f5d307085f3390fdf57e267fc9072cf359c3f88fbbad34d6de9e 00160247
key image 01: c5ef0d7037fd05d901a46e0c5617b70f4c78cdeecc4c36cc519325cdf5f3a553 amount: 2.000000000000
ring members blk
- 00: 80aa1d0867e0e3456fd83ec555837844930c5b8fcb82c2da0bbee6a715b92796 00160061
More details
source code | moneroexplorer