Monero Transaction 2afcaafa2b15703b9bc1e56a0730599c96a4b7ad89fa9c3c39d520bf8e57b5c4

Autorefresh is OFF

Tx hash: 2afcaafa2b15703b9bc1e56a0730599c96a4b7ad89fa9c3c39d520bf8e57b5c4

Tx public key: c28ed08461dc21bdd183f7a26942846f396c10d9e97a8ba9d29b0426abeca3f2
Payment id: 16c90161759e5b394f56787976feab73ce63714ceab1ca0fabf8958b21820b85

Transaction 2afcaafa2b15703b9bc1e56a0730599c96a4b7ad89fa9c3c39d520bf8e57b5c4 was carried out on the Monero network on 2016-02-14 09:40:23. The transaction has 2339485 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1455442823 Timestamp [UTC]: 2016-02-14 09:40:23 Age [y:d:h:m:s]: 08:295:10:41:41
Block: 955653 Fee (per_kB): 0.100000000000 (0.197683397683) Tx size: 0.5059 kB
Tx version: 1 No of confirmations: 2339485 RingCT/type: no
Extra: 01c28ed08461dc21bdd183f7a26942846f396c10d9e97a8ba9d29b0426abeca3f202210016c90161759e5b394f56787976feab73ce63714ceab1ca0fabf8958b21820b85

6 output(s) for total of 0.505000000000 xmr

stealth address amount amount idx tag
00: 2bd33a6f0712fbadb20af3cf7cbc83485577f27802b9c982b051f9bca2777b8a 0.004252880722 0 of 1 -
01: 36115759a76ebbe7f1315e2ba4f057e29d8cb12c9fbb83a3b2901397076e2f65 0.060000000000 192514 of 264760 -
02: f0fc5fd8506214736a26f1c4fe6ab4a643cdd907b430e4f9cdb393e45ce18ed7 0.200000000000 1083790 of 1272210 -
03: 12831fa0fec7018ef8b4a190a2fa6f121e10d7e6a2cff4b4e2d09e0cdb18063a 0.000747119278 0 of 1 -
04: f804d28ffad66d67f35c98e35562ef5e19a20057f069e520e6b3248a2457c63d 0.040000000000 220521 of 294095 -
05: 915887bbd8cac77a4a1af47218bfe2e6b5d128c51b1ea772272cd044f9e9ea77 0.200000000000 1083791 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 0.605000000000 xmr

key image 00: 2e985ed909bf262afc5830c3beb7970c06a4200afb200f52dd3a5f4c118d3a57 amount: 0.005000000000
ring members blk
- 00: 81ad7e0c23bc291a53dec60cde8019fbc09885ea4e8f4e22b493acd7540bbda2 00951345
key image 01: 2965713a5b7cd1f5fedf42b89cf898b45b188c912384d1a5825fac81cb1aa175 amount: 0.600000000000
ring members blk
- 00: 8d85c68f4248b7912d9cb81ee2aa38c029675b87e01292caaa90f81bd877598e 00954902
More details
source code | moneroexplorer