Monero Transaction 2b0ab884b72c3205bdcfba9a78dae303e1169aaa3e9b96faba65e9805ec6bec8

Autorefresh is OFF

Tx hash: 2b0ab884b72c3205bdcfba9a78dae303e1169aaa3e9b96faba65e9805ec6bec8

Tx public key: 06e144a526a1a2fbd71875b53366509ebdff2b605acb10b8b44cc42ca168ce61
Payment id (encrypted): 2fdca97be4fcbdc4

Transaction 2b0ab884b72c3205bdcfba9a78dae303e1169aaa3e9b96faba65e9805ec6bec8 was carried out on the Monero network on 2020-02-27 19:05:39. The transaction has 1251735 confirmations. Total output fee is 0.000162830000 XMR.

Timestamp: 1582830339 Timestamp [UTC]: 2020-02-27 19:05:39 Age [y:d:h:m:s]: 04:280:10:14:46
Block: 2042956 Fee (per_kB): 0.000162830000 (0.000064154644) Tx size: 2.5381 kB
Tx version: 2 No of confirmations: 1251735 RingCT/type: yes/4
Extra: 0106e144a526a1a2fbd71875b53366509ebdff2b605acb10b8b44cc42ca168ce610209012fdca97be4fcbdc4

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 196e7414c5cae6938c0808139fed61c4d6a0ae1f4a4202150a2f977ec7d4cfe6 ? 15165360 of 120723111 -
01: 14ac33d0deecfe7a94e3114bb6b18f21cd746c1fcd5d371eeab4a67af55e9fc4 ? 15165361 of 120723111 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: ff4ae5d49a90950a681cada9efc8219112efc5ed2c0ca3410879299a2ca39360 amount: ?
ring members blk
- 00: 8e07b38d61add6b37ef84e166ab902805ced76618e30db63c996e36b22f4a1f1 02021348
- 01: 57bc4561a76d26d737dbf8959eaed83c799c7ba00f7ef7cbeba709dfc83dea27 02033170
- 02: a2ec9ab99775fdf74a90fb0ef294cb91f5ebaeaee7b9ab11ebd2f7e301b4cb9d 02040785
- 03: bf68df2493e2b879d38835a77558046f9af6ea1a4023e0da75051308a72b72f4 02041925
- 04: 8c5d8913a9522d8ace149395ea2e6fe24acc09923e412eb00c9f74bb3c6d83a3 02042197
- 05: b561f7ea5b68147391585c7517cd71b8b42387673dfb6045de93ed6e590390e7 02042365
- 06: f7f8c0c81f87957916ad6d3a032c7d3b76262a923e37cf44c0e5fc8652e24a9e 02042568
- 07: 28f6ae7b2e8e72b01aea71e124e27f817ba7c651f7e1008a109288daeae3030b 02042639
- 08: b9bcb133286b68b931ef58a848432bbb7bb6d214cf4aafe5e753dbf99319492c 02042762
- 09: f389c98d9cc92ccd0abb4797eee6f92d196eccfa0a873f5821f48aec9846c9f1 02042809
- 10: de87e51779b45df3236c59cab1f4a56a8a3866f0a986d3ce6edb42172fa32904 02042830
key image 01: 7b9b215654f2199cf496bd339f2f463cca35aeed4f72d898ef15518e4ebf3c64 amount: ?
ring members blk
- 00: 70d01d4cfab3eebcad58fad97d4593e5194ce3c4aa636ec25c7eced4a53697d6 01962021
- 01: 77f47f279a4692e9b66455f0ad7babddca8a8fd8625939c7d3f9588973ed2a72 02037419
- 02: 491196a9bcfaf29bb6f30bb8f3d9bb8b6f460fffe576c69933b44481cccfce80 02041275
- 03: 2f8ddc613e6dcaf508b768bc9a0331bcc74bcca3fa47aa30fe26744f4b8067ba 02041504
- 04: dca850526153f961a97fe77b239ecf33e5a9378c0e4dca1b3b04ca2afae0a5a6 02042542
- 05: d65c7658d90c10534555f6cd4e323d46f376ba9cc803369f0f353436d7c5b15a 02042873
- 06: 03e51f3823e41b720fd7fb27b2425184a524f5c4959cb6327d381bef7cf3c651 02042891
- 07: a856fea8ec5e485b938a394f09cc9fadb06226e5476d903d8bd6d3627808be9f 02042891
- 08: 879e67ab4f370924c35667d54f8b97dee424b37e797e147d01d436f8a033121d 02042922
- 09: 4e05990d6bde4f95f0fce265be8e80d4a74a810c6aa7904e0ee77c7c89b9f43f 02042936
- 10: d415994196044f35804d0379a9e98a0eaee21cd0667bc171f13eed6c597a7aee 02042941
More details
source code | moneroexplorer