Monero Transaction 51f3104a106b66d81e877515ce905f7249387d74933d6148f1e6fde54ed188f4

Autorefresh is OFF

Tx hash: 51f3104a106b66d81e877515ce905f7249387d74933d6148f1e6fde54ed188f4

Tx public key: 6052c68f65b5b46bfb6c782330e9082d33ca6839d9913e81d507ba8b805c5540
Payment id: c20501ce2b554e17318e2a0ce9bf350994ed0b622058ad536bf7c5b7b494b852

Transaction 51f3104a106b66d81e877515ce905f7249387d74933d6148f1e6fde54ed188f4 was carried out on the Monero network on 2016-02-13 10:15:18. The transaction has 2404433 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1455358518 Timestamp [UTC]: 2016-02-13 10:15:18 Age [y:d:h:m:s]: 09:019:20:36:55
Block: 954280 Fee (per_kB): 0.100000000000 (0.116363636364) Tx size: 0.8594 kB
Tx version: 1 No of confirmations: 2404433 RingCT/type: no
Extra: 016052c68f65b5b46bfb6c782330e9082d33ca6839d9913e81d507ba8b805c5540022100c20501ce2b554e17318e2a0ce9bf350994ed0b622058ad536bf7c5b7b494b852

7 output(s) for total of 21.305000000000 xmr

stealth address amount amount idx tag
00: e988167d9b299fc706a84fa79140afcdcdaf69bdadc4f51c0e7fc541b5a49bf2 0.002428624658 0 of 1 -
01: 29ca739d6dac380b7edadb6b6508f6fbeb89bda414dead138f30c01df8303fca 0.090000000000 216306 of 317822 -
02: 8547ba0e079039ce0de724b972fc7f2b6c52284319509928030da02ae685bb3f 0.900000000000 333589 of 454894 -
03: 1049d0f91151dbb4b53fb43b7150f4b39ff97397936eecdbef1959a9507e4d80 20.000000000000 48127 of 78991 -
04: 84adb7ef2dc88afad93f7fa27436269b73bf3d1db860fec8a05fc0ec1844072a 0.002571375342 0 of 1 -
05: 32bfd11d7a850875ffcc47e744facad1a4654fd905d2531400f0217547c1a978 0.010000000000 425942 of 502466 -
06: ce618860bd945be685bf9c438221ae5660c8cbd528e0ebbfdca6d807962f0951 0.300000000000 780957 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 21.405000000000 xmr

key image 00: 38dd300f2a8b8923c2d84036be8ba3bbb7a95c01a2c252e4a9a598d3a2bf7ece amount: 8.000000000000
ring members blk
- 00: 280f35d892f23d9ede1704cce7d7f15b883c9f50e4d31e75d251998a50f74043 00953398
key image 01: e20291d7f6b5e6d08abd5bf75cbfaf7b15105dbd14994ec7876b65a006ff06e3 amount: 0.005000000000
ring members blk
- 00: 15a83fe73c68c6b3818a050753b5123548b5c3faee7e433d8c77260c12d04bf5 00934780
key image 02: d08b23d3ee81e5240f59f51a1a0557cf48ffcf062b814fbd24036549c95eba49 amount: 10.000000000000
ring members blk
- 00: ed6757f9b75fff91018db55ffd77a7494d943f0d28296801011dc5dca84df8db 00953183
key image 03: 1b0f1f1ffa80605dbfe202f46a78c30bb977f2a40ef7851698a5ccce72c83292 amount: 3.000000000000
ring members blk
- 00: c8de3c0254e701bda536966e38a01f42f824f9299be05fb38123621aeef3500f 00953085
key image 04: 8a00c9937d8c9257195fde6714f68e8fe5696770d159e4e395a82e1c9b177ab1 amount: 0.400000000000
ring members blk
- 00: 307842639389e6eaad30c95105a0b0979b958e38a8184c33e1dfe889cbade975 00953825
More details
source code | moneroexplorer