Monero Transaction 488ae44053f59fff8bc1fcd51864fd452a77b294467f35bf32fb432ed97119c6

Autorefresh is OFF

Tx hash: 488ae44053f59fff8bc1fcd51864fd452a77b294467f35bf32fb432ed97119c6

Tx public key: f0fa69bd96c3dee376a1aeba7be26d34b08567f3a685cce5e86c25a5b58d3294
Payment id: cb7a35651b542846214de03cdf827133dbe105610b624a86bd4ad86b7fee022e

Transaction 488ae44053f59fff8bc1fcd51864fd452a77b294467f35bf32fb432ed97119c6 was carried out on the Monero network on 2016-02-15 09:34:14. The transaction has 2338251 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1455528854 Timestamp [UTC]: 2016-02-15 09:34:14 Age [y:d:h:m:s]: 08:294:17:55:12
Block: 957120 Fee (per_kB): 0.100000000000 (0.184172661871) Tx size: 0.5430 kB
Tx version: 1 No of confirmations: 2338251 RingCT/type: no
Extra: 01f0fa69bd96c3dee376a1aeba7be26d34b08567f3a685cce5e86c25a5b58d3294022100cb7a35651b542846214de03cdf827133dbe105610b624a86bd4ad86b7fee022e

7 output(s) for total of 6.900350527722 xmr

stealth address amount amount idx tag
00: afc26568019db271953906ad857d9a9443eecba516af8347ea9169c286254c70 0.000791442028 0 of 1 -
01: 002e8500399db92bb9f7a63743e4d0a4f5e0ea02cafc49f30c6d8fce18d6a1c6 0.009000000000 182454 of 233398 -
02: ec4087e7bf39a5c0eb6aa7afd4d9eb6976aa3f45b3e475632d4157c3c47aa8f8 0.040000000000 220707 of 294095 -
03: 986672af724ae26962808d2b48d638b063a39bd2640516fc4f3ed2833f8c7c63 0.000559085694 0 of 1 -
04: 0061987584907dc9d53ffb078630fb0f1ba81e7cbe1bb16446a3085bfd162a99 0.050000000000 207177 of 284521 -
05: e43d096bdd0e8208d7e37f06470a72c048ef37314feda71b0b55807b27ec5255 0.800000000000 381447 of 489955 -
06: d69ef5b1378182e2e03e7f58eaa7642e92ec7f2b2fd8d7bcff22ffa5a29f3baa 6.000000000000 130366 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 7.000350527722 xmr

key image 00: 5af3f71103c62fd5969a87684edbd62e2c847eae7dbc1d5cd4b327a6e9ae2777 amount: 0.000350527722
ring members blk
- 00: 667d0ca700ca063813096823c29d3722a6944cbe0e15402c61be1d927f26a7b8 00943029
key image 01: 911de2840b5e5ec0d42af31882b0b4aa89ae3b29492795270c1762434af9a1c4 amount: 7.000000000000
ring members blk
- 00: 8a062644664b3153f1d042d9d99226de6802a5c19e5c8f11154b85b948116eb7 00951306
More details
source code | moneroexplorer