Monero Transaction 5157cc66aef5a0c441872961d1201e1426bee5286b874b4f2d1c1c7d01c94da1

Autorefresh is OFF

Tx hash: 5157cc66aef5a0c441872961d1201e1426bee5286b874b4f2d1c1c7d01c94da1

Tx public key: 6980120a3d35b5292651cf987cf10d09f9d061566a978e019e7f38fe83891fda
Payment id (encrypted): 202db867be95efbf

Transaction 5157cc66aef5a0c441872961d1201e1426bee5286b874b4f2d1c1c7d01c94da1 was carried out on the Monero network on 2020-01-12 02:26:10. The transaction has 1286332 confirmations. Total output fee is 0.000034780000 XMR.

Timestamp: 1578795970 Timestamp [UTC]: 2020-01-12 02:26:10 Age [y:d:h:m:s]: 04:328:10:40:32
Block: 2009327 Fee (per_kB): 0.000034780000 (0.000013682182) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1286332 RingCT/type: yes/4
Extra: 016980120a3d35b5292651cf987cf10d09f9d061566a978e019e7f38fe83891fda020901202db867be95efbf

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 1075d1f387293140637d01abdf41fd7c99860d5068f2c2f933d24cf423079500 ? 14261892 of 120829729 -
01: 08f0836b67cdcc39e7f7c000429cb2aa2d3951eb0445bab182e2c6fe534ea28f ? 14261893 of 120829729 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 72ae0e0421dbc0f0d3b618987332a81bba3c1426a0929fed3be33d024ce00b41 amount: ?
ring members blk
- 00: 754fb6d4cdb2ff71460529ac39a1ad4ca86dc8a4cafa1ffadac61eaa40d7982d 01941664
- 01: 668126343da1eee97a5ea20088877c9009f3c44fa3b1faac8e9f752090a8d32e 01996620
- 02: a8dc52b987636872d1def9e09d42552ad782b146476a3b814f0cdcce367151b0 01997997
- 03: a324682d97686cb55f9d369d28e0ffea16dbf2f65441ae90bc1858e329eefb15 02006427
- 04: e03be7a05d1594716dac4e25db8daa706a939eacf4cafb47cae6bbf1a8556a3f 02006837
- 05: 948660b05f3b2850903575d63cb82016a3d6ec4163c778228b9f2fd22995b849 02007266
- 06: 9f1ec08d58edbb1877eff246dccd1e2064fe864e87e83e346a72ad1767a587a6 02007883
- 07: e591f4d3f8d272afec05432febfb8081d2ec4d03c4de5c32183b1e4c1f922500 02008340
- 08: 03e1bc12d2189ddb2d65df081020e009b82658f398d724ff34a5d31c2d34a69d 02009018
- 09: a3d51de0fac4d08d3b141470d71bd5c055164699684b8e3c25358d065b5209f5 02009061
- 10: ffd4ff50ae77d1b7eb2aaacccda1088b7bd1b9e1fac9bf15b2fef9e422d30db2 02009285
key image 01: 5746b94ccab9005d5d79f1de9785f0b972ab73aeaeabd0f83675d622947b5daf amount: ?
ring members blk
- 00: ade03802b0df36d1c1475dc42b86c0d5997e8b9a13409d020f2f96eee4adbdbc 01997225
- 01: 2caa18fc941a4952ac7f6986d9692a838e1785c8e3bfbe45e0db161184286115 02002014
- 02: 6c83201ee815140c0febf83905aee9e1e16d9a0329fe7575f1a0b7a7d511c6db 02006705
- 03: 3d7ef075ab062de93db5767f9924f943c631328fb713382b97deda0ebfe2bcca 02007834
- 04: 2b9afbb7c28698a3b7d725290e118d4d776bf46ea246ad2a8c647faab269d17a 02008632
- 05: 91e5755eecf44e71a23be8f1084ab920a89a075d29d9f44f7ad7ca94d8549ade 02009178
- 06: 2afccdba972a1bb19de44175ac5005d94d6ae95fb8cc54af046fe15dcf0c4c8f 02009199
- 07: 3f2e87248b0e43fc3cd82c8c9e34634890c119669d847445d3cde166e206a823 02009236
- 08: e8dda1087c136b7a111fec560ddee12d6f682c747cf363aa1f94dc45d09ceb88 02009293
- 09: 4a97a88b7906693032f71d9b8e1e56481aa307a265aeb56a2f83facbdb55d786 02009295
- 10: ec6d3e9257aa30ffcf33839e22edeb569c7ec96a6d8e7bdc688fe57625be7967 02009302
More details
source code | moneroexplorer