Monero Transaction 45bef4fa43a911b0903196af65f7d8ba30e25c5409a2b9259758292f6d94f0c5

Autorefresh is OFF

Tx hash: 45bef4fa43a911b0903196af65f7d8ba30e25c5409a2b9259758292f6d94f0c5

Tx public key: d5fba47194fb4a9d256232ddc33552285432edf22a8cdafb9e2c5eef4394eded
Payment id: 325c48184f8847b99e67525c7f400d62738277122e184d478c1a7e4aa3f391bd

Transaction 45bef4fa43a911b0903196af65f7d8ba30e25c5409a2b9259758292f6d94f0c5 was carried out on the Monero network on 2014-06-07 19:48:36. The transaction has 3203302 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1402170516 Timestamp [UTC]: 2014-06-07 19:48:36 Age [y:d:h:m:s]: 10:158:20:42:34
Block: 75148 Fee (per_kB): 0.005000000000 (0.004060269627) Tx size: 1.2314 kB
Tx version: 1 No of confirmations: 3203302 RingCT/type: no
Extra: 022100325c48184f8847b99e67525c7f400d62738277122e184d478c1a7e4aa3f391bd01d5fba47194fb4a9d256232ddc33552285432edf22a8cdafb9e2c5eef4394eded

6 output(s) for total of 141.970794150000 xmr

stealth address amount amount idx tag
00: 559304da736822a39713369fb1bd4383977c10ef8e3e0edd60c90b1136f3bc21 0.000794150000 0 of 2 -
01: f6bc35d771d2d50e5eb7abe1e518c2542263d317098bd4ef2d557d21a1247003 0.070000000000 28951 of 263947 -
02: 6df77972736a9e8d39a03d95caba4efdd19ed6bd92c83dde7d7bad340b79ea23 0.900000000000 12931 of 454894 -
03: e0d8a386c885e69788b8c0a98e96f6fb83ca786860f8a7401319ccb3ef6093ae 1.000000000000 13151 of 874629 -
04: 0669eec5b8e41be5a2b12d56053ff74a9e97847a063a589f4c50bb488e3a0250 40.000000000000 593 of 41682 -
05: 5c64ccc95cea7e3e4602a867b2b61984edf79b75cb2261753e482de473f4d6fd 100.000000000000 1406 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



9 inputs(s) for total of 141.975794150000 xmr

key image 00: 546ff49ba64db148678189f6becf05f6576025fedaf88068e052b56fb993e8c0 amount: 0.000700000000
ring members blk
- 00: 2cba1a2339e25fd74208cd63302f7013ae3b5304f21f01fe460501197bfa2a88 00075129
key image 01: f9cc5323489930aff1caafc3bebcdedf0d1393db2c928ca3c6127d317ed11363 amount: 100.000000000000
ring members blk
- 00: 5cbbb1b77f2510d31d8b8489802f31837c6cee18210431c57c1c15583afd8622 00075129
key image 02: cd42648bf1a2cad3da002844427c569bff34704835caf07c7f0f7deb20a70445 amount: 0.900000000000
ring members blk
- 00: 0e28b61eca71f0762a8aaa5eb655ad6ccd14c6637bbc86e404502604279c06ea 00075129
key image 03: 8e0a9892f247ce30f806d8b89cc9c450ab0780e41da5470e8718e952c4f4b725 amount: 40.000000000000
ring members blk
- 00: 2021513841837cd2eca84fc3a3bd1ec655cf418bb9731b8fe30695a8e7b12f4b 00075129
key image 04: c99eb2ce8a648d4397fe4c0ed3ddeec8c7c2ea9e3b1ddead7abae659f95e6bf6 amount: 0.070000000000
ring members blk
- 00: d8ba3912fecc8836682044d375929af8b80690e41d24e37a903107f4cc21a730 00075129
key image 05: 8bebed71adb86495b550efb5f25cfca1ce7052aebfea2068098fae20d9ff7c86 amount: 1.000000000000
ring members blk
- 00: 7074d0c1742c724740cae47cf649fd4102ab525174f4e0c47414187b982f9202 00075129
key image 06: 474316329d7c029f003fd0646c4243a85e767544c150aea3c7a800a69fa3b400 amount: 0.000090000000
ring members blk
- 00: 9113beb63c20470f4fdcf57fbcd4736f5b3fa396707ddfc04515a06dc3eaf4dc 00075129
key image 07: dbc08f4bb7f3ec42e907acd7792ed50677587bb79f52351bf3eb795b896ad54a amount: 0.005000000000
ring members blk
- 00: f3537b4409f81d73cbf9db0444609fbcd39cbde096661779b25bead5c2df88e9 00075129
key image 08: fb8c8c4572ad117f7f65e8218e0f0cead4aeba11e54e3f90cbef8612e843fa0d amount: 0.000004150000
ring members blk
- 00: 364729c8dbb90c754ba1795110852923f8312606954a2d1aba9cda4d19e1c1f8 00075129
More details
source code | moneroexplorer