Monero Transaction 2bae98513ae29abd207fc29edda941642b60cc5e464801473d2c51ae76d3cef6

Autorefresh is OFF

Tx hash: 2bae98513ae29abd207fc29edda941642b60cc5e464801473d2c51ae76d3cef6

Tx public key: 68c0533adf12123bc6f6834cce88f8304d41ef34c48b139069e303b6bbd9c9d6
Payment id: 8a177bec5d7f4a31a09df92d1447f3ed9e1f5c80ffe14067bf3305bdc85abc06

Transaction 2bae98513ae29abd207fc29edda941642b60cc5e464801473d2c51ae76d3cef6 was carried out on the Monero network on 2014-06-07 11:42:44. The transaction has 3203530 confirmations. Total output fee is 0.005351130000 XMR.

Timestamp: 1402141364 Timestamp [UTC]: 2014-06-07 11:42:44 Age [y:d:h:m:s]: 10:158:20:00:12
Block: 74650 Fee (per_kB): 0.005351130000 (0.009613258105) Tx size: 0.5566 kB
Tx version: 1 No of confirmations: 3203530 RingCT/type: no
Extra: 0221008a177bec5d7f4a31a09df92d1447f3ed9e1f5c80ffe14067bf3305bdc85abc060168c0533adf12123bc6f6834cce88f8304d41ef34c48b139069e303b6bbd9c9d6

10 output(s) for total of 499.994648870000 xmr

stealth address amount amount idx tag
00: 4e4ed46906b21ee5bc7732216eefc0037a2eea48152ae43baa3333b7812bba24 0.000648870000 0 of 1 -
01: 3e72811f13c30c0fae50d360ecd689b54ebbb245930f2b7c0cb26dbaf3c7df19 0.006000000000 58760 of 256624 -
02: ecd8076b086e7a7bea97d4ea3c6095805b0f4897cdd4672754711f7af6801e52 0.008000000000 54025 of 245068 -
03: 4c35e0a47f19d45ee6b597b225c9b8e1565ad484956cd783cb4a9771018f720f 0.030000000000 50789 of 324336 -
04: 679469c10f679b73c6610c28bba32320714573ecf5f43afcfb5c91c5d56dc7e5 0.050000000000 35410 of 284521 -
05: a49edcbbe43e55a757217c277f77ec0943d84b316eabc9ecd4f2f05144058dbc 0.900000000000 12778 of 454894 -
06: bc262b0855ccdd15e2db56b29f581eb6d2c445acf27dbb89aa56591b34198fb0 9.000000000000 3210 of 274259 -
07: 9fd618f37baf341743c23c335976415b85497ce332a42e7ddea20ea2cd6dbb1b 30.000000000000 737 of 49201 -
08: cbc67703666f93ae6c5304c0d19b5d5ab7d4b24911ecf40363b724311aeeb79c 60.000000000000 391 of 26317 -
09: 0a947533c8ee375df098e9aef7d75f3d118c455b2caf2883cdc119a3156b704c 400.000000000000 290 of 13353 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 500.000000000000 xmr

key image 00: ecefd319a66215f145929163cc36c9e7dd57af83361e916bfc0686831f82da5b amount: 500.000000000000
ring members blk
- 00: dd6a184d0ce2534969efb63e24e719c463b2cc780c1d67ea400d1afe637736f6 00074048
More details
source code | moneroexplorer