Monero Transaction 5220114a499fcd0c443a846d226b140e60239a318d7454da3c0da02a98466438

Autorefresh is OFF

Tx hash: 5220114a499fcd0c443a846d226b140e60239a318d7454da3c0da02a98466438

Tx public key: 480b85c4c684529dc76b1b23bbf02304b1cc100c268e5af3eba3ba81513683a5
Payment id: 138548ef440e92f9b4e491427b6216d89306f857f1d0a1200c71adbf3a632f4e

Transaction 5220114a499fcd0c443a846d226b140e60239a318d7454da3c0da02a98466438 was carried out on the Monero network on 2015-12-19 20:44:42. The transaction has 2420214 confirmations. Total output fee is 0.017457040000 XMR.

Timestamp: 1450557882 Timestamp [UTC]: 2015-12-19 20:44:42 Age [y:d:h:m:s]: 08:353:05:20:35
Block: 875774 Fee (per_kB): 0.017457040000 (0.034443177187) Tx size: 0.5068 kB
Tx version: 1 No of confirmations: 2420214 RingCT/type: no
Extra: 022100138548ef440e92f9b4e491427b6216d89306f857f1d0a1200c71adbf3a632f4e01480b85c4c684529dc76b1b23bbf02304b1cc100c268e5af3eba3ba81513683a5

6 output(s) for total of 4.990542960000 xmr

stealth address amount amount idx tag
00: eb99e39b310f8648e16481244fa57b3497caa79bded8110453acb17b8d6734a6 0.000542960000 0 of 1 -
01: d8578a7628a1490a3af578305db72c1a224df93c48d6ce4d2ad552a6083dd64e 0.020000000000 293801 of 381492 -
02: cb568b13667f7599bb11671f58cef3c90c7e3f22a6adcc9dfdd7458967d698b6 0.070000000000 174535 of 263947 -
03: 25fe24d4f589b7ad66060800d2d46eb0bf7c6168f1afbc27cc1e5ca8da61f8e6 0.100000000000 840912 of 982315 -
04: f0243864b6801c5bd766ded2a8bb234df69ba0d83dd779ff8f8802e3cc0eac35 0.800000000000 371114 of 489955 -
05: 75cbba710a124307c73d72d5d81491c9f341d17b01d72efd7e3dfafdc4b73979 4.000000000000 183208 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 5.008000000000 xmr

key image 00: 6f8e66bfa3aa1ae6aa571a1fbac31a4b0c051d71c9fece6cf0f823febba2f981 amount: 0.008000000000
ring members blk
- 00: 14b2fdc80451583081d1a440f1c88fbd96e27debe7846fec640b7b0355d9c7e8 00074108
key image 01: b8153bb15e3ba55010c8f944de7f5f58aa0c6808e32d4ac3891804745680c79d amount: 5.000000000000
ring members blk
- 00: 41251ad336b7e9dac206f27c091b737f3613944f0a6f14712b07b51bb2b3c5f6 00684588
More details
source code | moneroexplorer