Monero Transaction 4ef71f1da11e531525a6bdcaaa05dae4f8ce69fdf5db4d7e87854e36752479c0

Autorefresh is OFF

Tx hash: 4ef71f1da11e531525a6bdcaaa05dae4f8ce69fdf5db4d7e87854e36752479c0

Tx public key: 18e298905f4bc4856ad20c33115e272898deb34a194a7d16df33bbd14bb35a12
Payment id (encrypted): 2e14f4e4a40e75fe

Transaction 4ef71f1da11e531525a6bdcaaa05dae4f8ce69fdf5db4d7e87854e36752479c0 was carried out on the Monero network on 2016-09-02 06:57:02. The transaction has 2174656 confirmations. Total output fee is 0.021204800000 XMR.

Timestamp: 1472799422 Timestamp [UTC]: 2016-09-02 06:57:02 Age [y:d:h:m:s]: 08:103:10:46:04
Block: 1126842 Fee (per_kB): 0.021204800000 (0.016072328053) Tx size: 1.3193 kB
Tx version: 1 No of confirmations: 2174656 RingCT/type: no
Extra: 0118e298905f4bc4856ad20c33115e272898deb34a194a7d16df33bbd14bb35a120209012e14f4e4a40e75fe

9 output(s) for total of 6.458801200000 xmr

stealth address amount amount idx tag
00: 6fd47f45e803b92fcf24c9b41a5f1038d0b8a2ebb63d12bb1247d83a8f883aed 0.000000200000 5645 of 22931 -
01: e06d12f1448ce932491598613e5f834ef2fadbc4ab85327d58d85e9ed6c7cca4 0.000001000000 24648 of 42360 -
02: 4b02f8737b9f3e07b426609bc576f5cdc6ec2cdf0bffae8fe0a299e141d9c494 0.000800000000 50168 of 78160 -
03: 90d18b2d579ded2e9851b4976b3d73731591899d55bbc1f8f9eafcc584724b9c 0.008000000000 203942 of 245068 -
04: 32b4e92fe33f0de1fe09a77c1b4c7a83cf5763873f4193c558b12d47f21bb3ed 0.010000000000 452510 of 502466 -
05: 377e6d3a976115bc8be60a339a492cbb0017a72d5e8d4208b6fb15548f2751de 0.040000000000 250640 of 294095 -
06: 4778fe3dd79f101c6440491189f440d29cd18300ef8296fdc4f374b196ccfbb2 0.400000000000 604680 of 688584 -
07: cc2097a5cd490e645ee38e7a620a7adbddbefc9ed4ee6ba4372baa6c86bf4aff 3.000000000000 269035 of 300495 -
08: c4f8cd899d94c1eccf8b085ea2059128b3463b705e559d4479c6e02c5ad4b787 3.000000000000 269036 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 6.480006000000 xmr

key image 00: 624e8041fe16b1f43818f30b6369beeca839b85d5b4870c5c13cdadaf01ee50e amount: 0.400000000000
ring members blk
- 00: d7c09354fddc9a14bfbeda6673bd5cbe66f77fbe81e6e537cdd04bedb35c9747 00330105
- 01: 8557c3110c805c06998b3531c30e6b0c74cf6fe7037f9fb4a9bec45ce3549498 00916399
- 02: d6f42c9ef3953c5a18bf56dab8fced56a9b7576f7cdcd5e283d46a0972b6decf 01126486
key image 01: 139ba1fe0da13aafc28f9965da68c1c83a2aeb85290f1f01211a70ef9fbd5488 amount: 0.080000000000
ring members blk
- 00: 84ab35e67e8dcf515e97bb158ef1e684425e2b80c756f7c588948d3d93b0d6d2 00112956
- 01: c05b6e36d91f4bf8703e03220e53808e95d9cd4f326873b534e4198321d6e78d 01010627
- 02: 9d3d78fe1012fe0c7e199853ef07000f1450681b8f3d82d605374dfda8830c0e 01126708
key image 02: 101893532cf83498d07494e1c355ade3c54cdb107f4d56d51c5c561432be55b7 amount: 0.000006000000
ring members blk
- 00: ee42f1871edeafaecea6f6b1687d26d9c58719ebaf2bcee7703f58eb204217f5 00033638
- 01: 49c767d3a06d0ee54ef6ec173ef657459188794ea34b020bce2d1d31dc7e0edf 01012861
- 02: 725d31870cbf96e50224c4230ae8fc61981d8c1943d3b0263a2cc839e22a5633 01126439
key image 03: 0b7079d00e9cad6d9170ac2c97e2007914851e8570f86e7ff74c8dd5ffec309e amount: 6.000000000000
ring members blk
- 00: c9b8d3d02bdf2f51efbd9acf4a8493d5b71b8a82edfcb07841e94d3f6f3b0b1f 00978274
- 01: 14cad0b73f1f784d4391053decfb2897bc4da993efd7bbb06de71d703651cbc5 01009097
- 02: d1c9f84cbf69ee99b6ed8a517ec2e6c050dda672f1b98db35a00404749fa5ecd 01126796
More details
source code | moneroexplorer