Monero Transaction 475f19686cd4d8a8f43132750fc98ca3a64c5fab937097db8080cffd9736c431

Autorefresh is OFF

Tx hash: 475f19686cd4d8a8f43132750fc98ca3a64c5fab937097db8080cffd9736c431

Tx public key: b906a368ebd2a7aa2683cd182cf7a543278a2fe7f296b0f86a627a8df11e6c29
Payment id: 6c9472048a3bfc85b5b27e39058d576e1ac56b7686726efbcd74f93392ae029b

Transaction 475f19686cd4d8a8f43132750fc98ca3a64c5fab937097db8080cffd9736c431 was carried out on the Monero network on 2014-09-13 16:17:14. The transaction has 3084525 confirmations. Total output fee is 0.142915862372 XMR.

Timestamp: 1410625034 Timestamp [UTC]: 2014-09-13 16:17:14 Age [y:d:h:m:s]: 10:092:04:34:10
Block: 216326 Fee (per_kB): 0.142915862372 (0.125834774780) Tx size: 1.1357 kB
Tx version: 1 No of confirmations: 3084525 RingCT/type: no
Extra: 0221006c9472048a3bfc85b5b27e39058d576e1ac56b7686726efbcd74f93392ae029b01b906a368ebd2a7aa2683cd182cf7a543278a2fe7f296b0f86a627a8df11e6c29

6 output(s) for total of 22.715588950000 xmr

stealth address amount amount idx tag
00: ec003b1c1a396f4ee2d9fbaa514dcf5c15b91c14111497813b94ea61a5711e00 0.015588950000 0 of 1 -
01: a50384f01123bc79d732b2e6f77ceac116fa05fb4b9173675dc496bc118bd4be 0.200000000000 489796 of 1272210 -
02: 94148c6933e4526fd2898fc74a9dc64512e7bc10a07f0307d1beb649bf0f4484 0.500000000000 311593 of 1118624 -
03: f34ca7e3d80f4c76baa73e371c3e9c449fb87fb73b8d19b41cd148647a03d755 1.000000000000 257184 of 874629 -
04: 4af902376f99f6540d73ab013e6dcf4dfc855af701aa8c4f525a7de5d879bceb 1.000000000000 257185 of 874629 -
05: e17ba8c7fb3d69077f9a147d691a1496a9ed944d3d0693e78d5a9b1b4ea33e49 20.000000000000 13110 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



8 inputs(s) for total of 22.858504812372 xmr

key image 00: 2bcf5128833b8a7b71a1946930613a011fea5b58b86e42a9ab19c59f2f55ebd7 amount: 0.058504812372
ring members blk
- 00: 8343bcd2a3b5d1c7c9236da32d0ec467485729334081859412bdf80f0347dda4 00215460
key image 01: b5479583c1fc50be491aab3bbd13be6928f289f6188d18e137a8c7a2f205daa4 amount: 0.300000000000
ring members blk
- 00: 7565dd3baa3c1c5f2b284a31a9e673f6404950b43482c00513fc628ceebe2766 00214690
key image 02: 044b273b5c15811b14d5aa0ec4c70e66ec3d24ebf30c86505a5f6784b8fbb36d amount: 0.300000000000
ring members blk
- 00: 69ffdad668fc562eec40a96e24c07d679d70d10c5ef5406b29ec3334cb3138c4 00213241
key image 03: 29eae660e5ca58d46b33bcabba9868467f785883fecf6e4905c077e62de7ef80 amount: 0.400000000000
ring members blk
- 00: ebcdc781ace8ed95557fb6c3c87d1c4c785ed3e882b5b02aa75827e280340def 00216164
key image 04: a0d23009b04818eaa572baa4402536054ace85a4d886103cddbebf2964a2e841 amount: 7.000000000000
ring members blk
- 00: bde6087c4b99a3108ed194f67efed0bc2b5be09d7c3f790ada064c41ec80d39f 00215412
key image 05: f7439e8a1e9287ba7ba80a7b496923d5895b7fd2ea2c1a836d40369dbf1e37aa amount: 0.800000000000
ring members blk
- 00: 735a1d40bc615f9d3fe7aacc11b1e53338e40ba29c97dd1a33510e6fdaa29d8b 00215250
key image 06: 1a9449a485cae7771efeafad33d2b1073da2eeb60e9e816e1272fc5178a167d4 amount: 10.000000000000
ring members blk
- 00: f639acbe6cca4c6034eba172687416bdde7ca43f970e165cdf9707508ab8bc80 00215862
key image 07: 5c26b049ecc6897f1a23ba326221f6f062e334133c2e59d87b59b955f124051e amount: 4.000000000000
ring members blk
- 00: bce3e6708c6b1ee722e11807147fb3e922855490850a28aa91055a2a9db4d138 00215497
More details
source code | moneroexplorer