Monero Transaction 470bc08545b93b22b36b2cf38054d5665098f089a31257a4989d7ad6139ca675

Autorefresh is OFF

Tx hash: 470bc08545b93b22b36b2cf38054d5665098f089a31257a4989d7ad6139ca675

Tx public key: 2934b765fce64eaeba9d1a4b7976e78f62b5de6ef6c97a2829bd67c0fc143871
Payment id: 6e1351e9f3dfa08c74014bb0f713ec63d50dd66d29081227b65a2e6402a6d50b

Transaction 470bc08545b93b22b36b2cf38054d5665098f089a31257a4989d7ad6139ca675 was carried out on the Monero network on 2014-08-21 00:22:08. The transaction has 3111969 confirmations. Total output fee is 0.006542276006 XMR.

Timestamp: 1408580528 Timestamp [UTC]: 2014-08-21 00:22:08 Age [y:d:h:m:s]: 10:106:13:26:57
Block: 182231 Fee (per_kB): 0.006542276006 (0.012908074432) Tx size: 0.5068 kB
Tx version: 1 No of confirmations: 3111969 RingCT/type: no
Extra: 0221006e1351e9f3dfa08c74014bb0f713ec63d50dd66d29081227b65a2e6402a6d50b012934b765fce64eaeba9d1a4b7976e78f62b5de6ef6c97a2829bd67c0fc143871

6 output(s) for total of 5.998457723994 xmr

stealth address amount amount idx tag
00: 388c05b7d13d634757293c9075992f445fc283e7e38cc9d6da3b6581abce1f58 0.000457723994 0 of 1 -
01: e67aafdca091e35452d3f4a237a2a087302714f5d7bc186ae40b9789a5d0d126 0.008000000000 170516 of 245068 -
02: 76e78afdf6d52037a173daae9391addf708d4fa52dda5bfce5a6ea8fde89bb9c 0.010000000000 337097 of 502466 -
03: 82a113c4bbd4420fc7f7c8aa14aa52015c1943faa08b5fe79b3253579d863217 0.080000000000 95949 of 269576 -
04: 2941d49c589494ffec545dc6e4eaaa8ebd41c59c3d509c69ee6342fdcdc0ff1b 0.900000000000 99024 of 454894 -
05: 2a25ac62d1639dc68f0b248b0990f484170aa50a75cce996bf4e8ca24ab74a75 5.000000000000 106247 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 6.005000000000 xmr

key image 00: 2c0ecdb89ffbc3af2d959c1b99d08577cc3afb36a187bbf1a79f7c714ab813a2 amount: 0.005000000000
ring members blk
- 00: 7efeee9fe99f7671ac9bd4b9c0e6cf116bb11b15c9d80e59e02358e812a84bbb 00182212
key image 01: d428ac9583569f0d12a7aacf945930cac9e15cf0095b80961a6fac4919e9a11f amount: 6.000000000000
ring members blk
- 00: f371fc041a59a9ac6ed66c24faba4020c0c7fd7ca4f273171f3e94ee3b5bb8fe 00181787
More details
source code | moneroexplorer