Monero Transaction 3efaf2b938fda7c188fd68fa5d51786dcf2b52e0d4dac46ab3856549dec090d7

Autorefresh is OFF

Tx hash: 3efaf2b938fda7c188fd68fa5d51786dcf2b52e0d4dac46ab3856549dec090d7

Tx public key: da707aa053c825920db209a8193f3aadde1752f4a01634160830fe4500461e7a
Payment id: 90a0af81a45a6eafa9a6c258061cdf97e90de45f129531367881d5572269fe35

Transaction 3efaf2b938fda7c188fd68fa5d51786dcf2b52e0d4dac46ab3856549dec090d7 was carried out on the Monero network on 2016-01-05 18:40:31. The transaction has 2388545 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1452019231 Timestamp [UTC]: 2016-01-05 18:40:31 Age [y:d:h:m:s]: 08:325:14:07:02
Block: 899737 Fee (per_kB): 0.100000000000 (0.184837545126) Tx size: 0.5410 kB
Tx version: 1 No of confirmations: 2388545 RingCT/type: no
Extra: 01da707aa053c825920db209a8193f3aadde1752f4a01634160830fe4500461e7a02210090a0af81a45a6eafa9a6c258061cdf97e90de45f129531367881d5572269fe35

7 output(s) for total of 5.900061689739 xmr

stealth address amount amount idx tag
00: 1dedfaf24bb8e9b6995c88301c9a765b137c2c72ff5a1b18c45cdca730af7aaf 0.000414923802 0 of 1 -
01: d430184bf809d0374b2e3f904ca91836dccbedf3de3144285aef6838775e6b5e 0.010000000000 418566 of 502466 -
02: a136484f4e341d84503a013aa4654376ff94658445771b0c05ebae9f3156901a 0.000646765937 0 of 1 -
03: 2958f610728d173cd60ea4e8352ed0b4eb06477f9d8b988c611ffa6cd5acf503 0.009000000000 180586 of 233398 -
04: 9660c0c94e15725e703ad976002b9f02d5901ba6a399a632e70c42aca5a83ac0 0.080000000000 179889 of 269576 -
05: 620be68efa59a8d529bfd00419712f55a8cf63b0f9fdb9a339b8d79306ef187b 0.800000000000 374506 of 489955 -
06: c82574c91ed04999258c8d849ff5ae5d4587c045dec0a81723beaadff54b2a04 5.000000000000 196278 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 6.000061689739 xmr

key image 00: 16a3ab42d832925f72decd01cae663dbf9eb00d01f3915b8f09df04bd2caa0b1 amount: 6.000000000000
ring members blk
- 00: 823b0e31dd08b579a0037009258b7941e3337a2fba56123117ffddb6620d6a3d 00899725
key image 01: fca32edb21665d791d1a0e6873c5be16f0201992222aec80fd050bec89a7b4af amount: 0.000061689739
ring members blk
- 00: 2a27c8ce50ac0aa16cf20905802cbfe794ecaaa215edd2f218c721dd02c0a394 00899585
More details
source code | moneroexplorer