Monero Transaction 45972fffcf1486c81da353929e2904973410e9933f2e3c3839509158496d1bb1

Autorefresh is OFF

Tx hash: 45972fffcf1486c81da353929e2904973410e9933f2e3c3839509158496d1bb1

Tx public key: 26d65cb7b71fd220ab37a7c26f1b280392c063014c920b1d4614af0c0ad1334b
Payment id (encrypted): 8104369d6c00a6de

Transaction 45972fffcf1486c81da353929e2904973410e9933f2e3c3839509158496d1bb1 was carried out on the Monero network on 2020-01-14 12:25:30. The transaction has 1300253 confirmations. Total output fee is 0.000034670000 XMR.

Timestamp: 1579004730 Timestamp [UTC]: 2020-01-14 12:25:30 Age [y:d:h:m:s]: 04:347:21:03:47
Block: 2011056 Fee (per_kB): 0.000034670000 (0.000013638909) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1300253 RingCT/type: yes/4
Extra: 0126d65cb7b71fd220ab37a7c26f1b280392c063014c920b1d4614af0c0ad1334b0209018104369d6c00a6de

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 38d4735af06ed1929ad9c27a5a7a24a9ed35b0411955ebbab8a23f1daa8da7fc ? 14308917 of 122317495 -
01: f96ee82c1e350eebd11aae178d81cb5408f998364b44f51bd83df0a65280a844 ? 14308918 of 122317495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: fe05743c4445d28214bedecc186f7b19c4555e65d4ae01f2dab862dde3c6e211 amount: ?
ring members blk
- 00: 3ca98bd91a979d9e59c143c1b83fd908a70fe2f2139fdbd7534e2ee8848264c3 01954517
- 01: 7571ce901764eae24db7e9566e425049cff7c75da6d7f1a71840c7e9ce9f831d 02006872
- 02: c3dc54d2d2d7dbd8a8e0787bb809763a374ec7b7b799833cbebc78db49cc8012 02009417
- 03: 2b4c7e6373a62b2991f4e47083191c0731915e62ec29e6d472803e0f28ea2e52 02009830
- 04: cc06cb68e8180093dcd595c8c9b97240de1dab490c8e7da1e17ed10fe369733a 02010480
- 05: 6cb3227f2b31aff0009e017c0726ec4660c87a2688de73aeb914ff3db0e08d70 02010573
- 06: 4063c263f6545ad717ea2719bd5dec4c1f6879172dce2cfff5bc7f4826ea1320 02010607
- 07: 6b87e4d4ea1ddc78e590ca09ffb719e86d211532d0371f9703be52b27d473964 02010651
- 08: f81a68688bfe3be46b8d9bca454f3f351d2b3e08d372b58c4d88057ed72ab282 02010824
- 09: d3c0885fab8914eea1223f03b6932b3e61cee225e8f1cdccdac4503e42cd4967 02011018
- 10: a71e03cdadf40923cbef585a2bee080fe56736a30d399bc7a0df9d4ec4285fc4 02011034
key image 01: 124d71049f2ad5cdda419976908c745f426d072eb5d2c4e6e1e57a68c35fc3fb amount: ?
ring members blk
- 00: 4d1d8dcb35669dd25874c3a993fdbe8af3763c62c3c8e434c6ed6eb22c4581d9 01847646
- 01: f81c27fbb8fc0feb099a6cefc0833557d97ef3b0ca3a00e7b8c4cded0969c5ba 01909889
- 02: d48a4edc72557e7bf4e9cd28ca56fdd94fd5cbd1096e6df0a975432f69fc9b08 01914077
- 03: a88a948b0ab9a83b716c98d24fee6bee11e1c92bde0fa10120b5b7da457dc9e9 02010214
- 04: 22630508fbadca27dd6625e1ef15313e6a27d8a97b108355da9c62c691afd8ac 02010792
- 05: d756860e67afa82c877e44d39e79604690095c0f037c1ff49952009bc63f7844 02010947
- 06: 716f67171f9de121e9b1aab198fa5fae70324a458cb13c52d362deaa87f5c3fc 02010982
- 07: c6c50d938eaa6c72c68d6e995d3e8adceb3a09c268bd99b8804acd8d713f49d2 02010992
- 08: 26ae6be6224ca2ef038db90d1430f7b51051a2537845da4a638526dc84c2be9e 02011016
- 09: 803a71661b8b640ee80bfeafbc208d51c1e382dda8af50d4f80497edd8d084c2 02011027
- 10: 36e2ade93dc0e2a4fc77c85fbdb3eefa83d986c2d377dc91a46c3ed22a763f5d 02011045
More details
source code | moneroexplorer