Monero Transaction 4970a216fba1d8d8bf3e0152986a31bef7d06a67135443761446b64fbd1e2117

Autorefresh is OFF

Tx hash: 4970a216fba1d8d8bf3e0152986a31bef7d06a67135443761446b64fbd1e2117

Tx public key: f6034f5128cdccc571b35cd9d3aaf2533814bd72f1b1961724eb7a3e28c15d02
Payment id: a1018ecc9a54388e1dc76ecdde70677aafaebdbff7adfa25a9fc8ade91da7143

Transaction 4970a216fba1d8d8bf3e0152986a31bef7d06a67135443761446b64fbd1e2117 was carried out on the Monero network on 2016-09-03 15:00:41. The transaction has 2163401 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1472914841 Timestamp [UTC]: 2016-09-03 15:00:41 Age [y:d:h:m:s]: 08:087:21:08:34
Block: 1127854 Fee (per_kB): 0.100000000000 (0.087746358183) Tx size: 1.1396 kB
Tx version: 1 No of confirmations: 2163401 RingCT/type: no
Extra: 01f6034f5128cdccc571b35cd9d3aaf2533814bd72f1b1961724eb7a3e28c15d02022100a1018ecc9a54388e1dc76ecdde70677aafaebdbff7adfa25a9fc8ade91da7143de20714fbab2b99e1627d609f366d73965752283f8d856ae43e8d00ff621b0bd043d

16 output(s) for total of 0.120000000000 xmr

stealth address amount amount idx tag
00: c033f7db20800e8ada7f2570fcef0966ab685769b69b1e24a2ed7b3a91f4d953 0.000000000020 2873 of 16798 -
01: bf68dbc51e366dc273915ecbee548eaf36b7473c0e32a6714ed6966507844e1c 0.000000000080 2847 of 16654 -
02: 245f208092b05b1ba73b84a02a3f90374bed4f8ffdb15d21d8d88733fdb8b6a5 0.000000000300 3214 of 17544 -
03: 4aebc2b987351c43a16da78614d2778757dc7e66675987266668da443b626c2d 0.000000000600 3220 of 17524 -
04: acdb40b12c33858b61b2a65a61016c92a7fa9789f83754d6a107f3fdc6158d95 0.000000001000 3137 of 17279 -
05: ff218584842d2003e18aa4b40248de8cf6459b4d104939be6c120737f30dc20f 0.000000008000 3029 of 17192 -
06: a2ca43cb58ad9908dd10c34d57c0a6aea6924dc7eb030a677ed2f367aecfb9f5 0.000000090000 6121 of 23499 -
07: 28891cd8a545bc291b299e2a58e9e2d87a8865f3be22d81e149571049f87bba4 0.000000200000 5870 of 22931 -
08: 6c7965c781d9190097c5e4dfa40865ae54092b91cac67df400b8ad3ee2f63fea 0.000000700000 5620 of 22578 -
09: 2adb1f20b8ef4c2cae5172b3da39352a4a8ef3f19b88a260d36fd1d4c371c660 0.000009000000 28764 of 46395 -
10: 0740d4f459134b00591fe5774c2dc97edd1e6c6ba48a829332a6c2498b2be9ed 0.000030000000 41617 of 59484 -
11: f0644efb37983a46c03dfefa6c72fd7d6e00fb440a3096c9461e687f443f16fb 0.000060000000 41307 of 59217 -
12: 52c12b734ad3533f6e89ac63ab9d8ecedbab549b667e5bd0020d625ce7b9ef26 0.000900000000 52173 of 81915 -
13: 25e7f40b6e9bd098d1bce24e8eca924b4d337f5ea67aae314a968fac8e445e53 0.009000000000 199715 of 233398 -
14: 1d752f0ca22a78018bdf8ce1915bc5fc3df871bba407d39bdecd488b91ce3a73 0.030000000000 281436 of 324336 -
15: 7582cf512ca123e266c9b8b38252246e97f10c1b60d2347d70bf3f74e2c46626 0.080000000000 221524 of 269576 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 0.220000000000 xmr

key image 00: 8e7b15713ae3cae08a97c8d72f55af473f5a1daa4ff43dc57b2446a917e162e0 amount: 0.020000000000
ring members blk
- 00: 9f117c797a511edaf8bd921d19dad896404bf9e64ccbf30169bc790de1ed3c66 00074511
- 01: 693c79e0523c7a1743671347d74d79a8d4b3c36f0f46396055e202022737901d 00087906
- 02: 71bd1f840ceacbab8e6ea75fd30b906fc04be610db17962db4a82911c7faa282 01127818
key image 01: e91d1597d52b154a2c321fbf6114a8731698907be780ff8597af57914bc27654 amount: 0.200000000000
ring members blk
- 00: 99b56376245bbd63c34fd436238682f3332909adc92e47a06466a2ab4555932f 00147887
- 01: 8015a746e3c846aed2267826b16948d8de734767d55aaa9a29754aa4cdb3318a 00148180
- 02: 29965640bfd13b272a1aeff8faa2393a284afe2717a2d632fa235e99c10a8cca 01127838
More details
source code | moneroexplorer