Monero Transaction 4fafdd8173c0b3a77ef02b2974426ee403257b80c6f75e84eb6f3e1c21eecef1

Autorefresh is OFF

Tx hash: 4fafdd8173c0b3a77ef02b2974426ee403257b80c6f75e84eb6f3e1c21eecef1

Tx public key: bcaefc9e2d728e198d142f8c4eceae7c9c0f073d53ecf755aefb3b8c4f1f5558
Payment id: f9bd184b758da538f8dd93f3ebe1134169ce4298c4fd61d3f24db78eac2e8a3b

Transaction 4fafdd8173c0b3a77ef02b2974426ee403257b80c6f75e84eb6f3e1c21eecef1 was carried out on the Monero network on 2017-01-04 17:15:59. The transaction has 2142116 confirmations. Total output fee is 0.004145270001 XMR.

Timestamp: 1483550159 Timestamp [UTC]: 2017-01-04 17:15:59 Age [y:d:h:m:s]: 08:058:13:07:05
Block: 1216588 Fee (per_kB): 0.004145270001 (0.003694305031) Tx size: 1.1221 kB
Tx version: 1 No of confirmations: 2142116 RingCT/type: no
Extra: 022100f9bd184b758da538f8dd93f3ebe1134169ce4298c4fd61d3f24db78eac2e8a3b01bcaefc9e2d728e198d142f8c4eceae7c9c0f073d53ecf755aefb3b8c4f1f5558

16 output(s) for total of 6.295854729999 xmr

stealth address amount amount idx tag
00: 3ed159bf5938cce0bca69742a99e27c46dcc5655202aacd4cbbdf4d323adab9b 0.000000000009 14802 of 18592 -
01: 5bd1530e087ec48698d56504ee98dc46bcbedfc9faf6083e0121ef098537e5c4 0.000000000090 14921 of 18751 -
02: c5b4d506440df4b29383f3e760ad72a8bee834b31419e73e97dfdf886be8527c 0.000000000900 15416 of 19294 -
03: 7cd2a75683c6b3d878399477ff8fcd7bb9918696cbfe3dcdf23cef4ed003f3c6 0.000000009000 15391 of 19294 -
04: a78622d9f905c6a0249e575d72dff928d5e1c25268868df603104b0444e8a7b6 0.000000020000 18844 of 22914 -
05: 5a9ceed443fe5d17b8c8987f47c2814a7089d1447e77c8b34f9320f958a0b5fc 0.000000700000 18575 of 22578 -
06: fff821f2be6de7b14fb08b3e9d4b0ed663fd5d9b1c62047c88736b2f7e2987e3 0.000004000000 37483 of 41587 -
07: a3821120923c10b6ce7989234cf41f99f42798b27b3d63d6e212f27217047b91 0.000050000000 54736 of 58905 -
08: 86cd062a8df16f2a0dfad48367aebf5cef01044c8f1390dbaf1473e8f2cf169a 0.000800000000 73354 of 78160 -
09: d5e75223e203ee9ad35b2097217896bf43714e23ef1909092f8f2926564dbf82 0.001000000000 93451 of 100400 -
10: f069baead0f7c0168fb26e555805e616070361dd012ce486cf0c9d81ed2a6689 0.004000000000 82031 of 89181 -
11: fff6c4860025d5b10904a2d63dcf44580b48c55b6913d2fcef71edd85c4ac44a 0.010000000000 492809 of 502466 -
12: 4b2e6b885f23e560ff12f6f23cecca81278afeab30467f44d6256fab40440d3f 0.080000000000 263679 of 269576 -
13: 9ca636d913d9a7d9d3daeab2d09bb93e58389c1a3af8d0d323838e61ed522e22 0.500000000000 1110158 of 1118624 -
14: fc665a8ee18679d5d514f430ac1476b1fa927e3d77afdb93c67857dbad857681 0.700000000000 509273 of 514467 -
15: 284eb25a3fa6a150b0bf37e615bf1ff16751aeacc72c90650d4eb6b923ebbf44 5.000000000000 251766 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 6.300000000000 xmr

key image 00: 2486418dfb6f2d2e1e6016961ed501912b096514e606aa59c13d2abcce14fc02 amount: 0.300000000000
ring members blk
- 00: 33faad3bfaa33323a8892043d03fb43f6cc601c50f253b70dd9d66b813438fc0 00343004
- 01: d491ab2cd4a928b0f2dd1a4a46843331f976ced1417a410e10b142c4b16e6e8c 01133606
- 02: b5c715417854cee6e960ac9d87ce92571dbdbaeeaaa0497d258fdf141ac7dc34 01216448
key image 01: d27f80320f9d9d00e16092cb9e86b2b48ec0c550836488203351b66dbc4f2d39 amount: 6.000000000000
ring members blk
- 00: 24446665d245764896a0b55ad6bc039c9c5403e6a6ef188cb926c76bad4469f1 00083732
- 01: e7c83671f33aa6f198731d451add09e1d4629c78e010a385c3c21108454ee1fd 00826552
- 02: 7c1fcf6c4d9222bbceb7f145997c71cfc2013407e13145bb0310b9dd7798934f 01216424
More details
source code | moneroexplorer