Monero Transaction 2af0214b45844de2571ae54b313c76da8e1853546c9a3e4d5dc59db907901be9

Autorefresh is OFF

Tx hash: 2af0214b45844de2571ae54b313c76da8e1853546c9a3e4d5dc59db907901be9

Tx public key: fc3ceeed852d201b85a35cdd36d55d0f9d771d1e3c5a3ceb36575ef7e0d02554
Payment id (encrypted): 69c45f2653025efe

Transaction 2af0214b45844de2571ae54b313c76da8e1853546c9a3e4d5dc59db907901be9 was carried out on the Monero network on 2020-10-11 15:59:02. The transaction has 1082591 confirmations. Total output fee is 0.000023900000 XMR.

Timestamp: 1602431942 Timestamp [UTC]: 2020-10-11 15:59:02 Age [y:d:h:m:s]: 04:045:05:17:25
Block: 2206086 Fee (per_kB): 0.000023900000 (0.000009402075) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1082591 RingCT/type: yes/4
Extra: 01fc3ceeed852d201b85a35cdd36d55d0f9d771d1e3c5a3ceb36575ef7e0d0255402090169c45f2653025efe

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 66902522d025814fcd37e44f4c11ffe5ea5dbaf2a4209ccabb924e3f1b169099 ? 21718716 of 120119452 -
01: 998bf487460afe36c1fed70876d416c1a6806a906b0157ebff251fbc03757200 ? 21718717 of 120119452 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 690ddd90f8340f405e9a1114c4131f9215762e21d37bb823c5a9244f03601e7c amount: ?
ring members blk
- 00: 02542586642cad02a2ddd88c7892833e522316efe8361d7a204d83448c4a4516 02196040
- 01: 936fc07fa55c23d134d762d7d8960814916d326f72977a60b1df318a15f3e0dd 02204391
- 02: 22992efff57ccc109fc96ccc459bdfb9d6faca130c736673b2ee65be3dbd5465 02205416
- 03: 04d485af50c2f823007438e447c89ad21f21e66b0f547365f403fd3afaa2cfb1 02205835
- 04: 9e76a4542c2cda1b317819104af6efb1e219b56a9a04336826cb733635968bec 02205842
- 05: 19ce64aae5d34ea23d2d03633699253d1e4b9a3d0745df747ca1e9506cf7f953 02205877
- 06: bc1287cd0a39cddee3fd11f314e3ef133bfb17f26574ac5404b9b0c123253a1d 02205924
- 07: 209b775e2d9b5f882e9f6dd5eab6ddb6a620ee8bd0137cf08cc4f65d570c81f3 02205976
- 08: b1a83e9acc3c04792b9aaa5c0568c4e4671ef1c3cadae7df1f8888b65786d93c 02206039
- 09: 60cdae40d198b6ed06f0b6eacee97e88bd7374959e6f2c52473d6c6f0ead4c1d 02206052
- 10: 08068ab4e69d233c6e5420ed34a7e946804a511d32cee7f31514d4a08eaafb9a 02206076
key image 01: 104ec52dc7d123376272b673182dd378d45af2f6f86f2c747757bd178c946942 amount: ?
ring members blk
- 00: e38f13263ad1b4fdfbf51f054631e9d525b9dbb5de96f386b16352c9816f15a9 01300135
- 01: 342f26dadb121a0729f5ca6e799af6c2f896b99c0adc10c0042f580a0543ccda 01970201
- 02: 8cc6f5ee79d22d107e098beba0d8a2b6fb3df6fc630f714cdedaaef6c7194e0d 02200975
- 03: a0f4ed12c697ff7c4600f0884b0f27a5d36c6781c137e755d1bc0f55143057be 02201626
- 04: bdc62bf2a133c2304e6a09570cd0c6947b46789b85f8a492dab085c3cfed408f 02205775
- 05: 83894f3828f71c609a7d0c559d63f31ec5698484b51982f723e5ee059abd9653 02205832
- 06: 51f1c8206b12ff1a6c4723f1e8bffa9b07f9122e2f55cdebe7d2d929f71d04a7 02205910
- 07: 02280a60bd1ce0ed34ce1eb9b6303c2ce2b7721596aa4e2f6e31cd983d8db0cf 02205976
- 08: 18823dea9aa11cae8f9f7664558da3be5a3c783cd3aafdc34cc6b200c159409d 02206055
- 09: 427a62bc9405ecc3d006d4d137e617d25c48abe2accec7b83a486f240f984802 02206065
- 10: 0c6c2fbca741358671ce0f5192b63a6fe0a3905e177a6f706270191c58ef4b0a 02206071
More details
source code | moneroexplorer