Monero Transaction 5428bed485a8820e545c29c865837848eadda5a1f738d3c3f326038316e0172f

Autorefresh is OFF

Tx hash: 5428bed485a8820e545c29c865837848eadda5a1f738d3c3f326038316e0172f

Tx public key: 5a299ccc3d7821b42ea414e8dce5560229a1b8d5a9a2c66f6bb7c860a9804d52
Payment id: fad7befcc0729748ab00323f62e5730d5857c6efdf00f55e9f51eade0761e1d6

Transaction 5428bed485a8820e545c29c865837848eadda5a1f738d3c3f326038316e0172f was carried out on the Monero network on 2016-12-19 09:58:17. The transaction has 2166863 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1482141497 Timestamp [UTC]: 2016-12-19 09:58:17 Age [y:d:h:m:s]: 08:092:15:10:50
Block: 1204719 Fee (per_kB): 0.010000000000 (0.009126559715) Tx size: 1.0957 kB
Tx version: 1 No of confirmations: 2166863 RingCT/type: no
Extra: 015a299ccc3d7821b42ea414e8dce5560229a1b8d5a9a2c66f6bb7c860a9804d52022100fad7befcc0729748ab00323f62e5730d5857c6efdf00f55e9f51eade0761e1d6de20a1ade4e4d517b213447e88fa6e5c316cb0b98f37d733ec55a4da131dbf3c57ea

14 output(s) for total of 20.080000000000 xmr

stealth address amount amount idx tag
00: 0a11fc7050e02f1ea0cc471bb55da02e784b3d31d6340f6a698d6978af403a88 0.000002000000 34475 of 41703 -
01: 68eaa2921164526f5ed98ddbc36b76cdb929a77bbbe997d1caa79379f550f5b0 0.000008000000 35536 of 42741 -
02: 4ca00862bf2fd822258cd13ef44c9463cde4b80325c5d8c06e568b30ac6b7ba0 0.000010000000 52549 of 59775 -
03: cefbf9fbf3eb5d0db148143ce468e1e09cb714176c7534c12989a0a0817650d9 0.000080000000 51788 of 59073 -
04: 419ea725cd49bb804c362538ec2c4cc9a0d1fb79becf81ec048cbabd5d1c7cdd 0.000200000000 68843 of 78038 -
05: f05a822f93ed299d852b0c7484425dd1b17802522ddfdad9df2a81c29cbf131a 0.000700000000 68422 of 77523 -
06: 71bd60a1da8e80e70ea8f8b9a58381611b3551d6c626f1dcdf42861845e2f2db 0.001000000000 86646 of 100400 -
07: f91836109c13b9394aa40e2e1daf21b69a453a62625fbdcf7692d59717105a18 0.008000000000 226229 of 245068 -
08: c6a6b2e6dfd5ad3d3dec3bbc4c1b3e3d9fa27c2f2692186bd73c5afec08421a5 0.030000000000 310447 of 324336 -
09: d8a4baa4793c81e9f8f57e1e00473e7d7df6c020c7e115233c84874bc7324cde 0.040000000000 280268 of 294095 -
10: 7914de645992df8aa999eecb7f014759587f06fd5d6130380f2efd8c1b0adeaf 0.100000000000 958017 of 982315 -
11: c9d7bccc0eca357d39ccdbc02013af0d8c4cdfd21de415050e2f86b1016c8bd1 0.900000000000 436764 of 454894 -
12: 149852868267c3e8fafbe25edff8f2c3ddc774d1060b8503d042bb5baf2774a2 9.000000000000 251507 of 274259 -
13: 6c6ecaa05424a74248ff627e62f12c8b16f1a6b52716ee603f8a010a4f4cafcd 10.000000000000 914931 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 20.090000000000 xmr

key image 00: d07bda938999f67a6d52c2fddc0f7ed442cc30a6795512e05d9c23d4a9bd9f9a amount: 0.090000000000
ring members blk
- 00: a7723f84206febb50fb5bc691459cba5303f9a309fa25d0d52f19359a021f70f 00325366
- 01: bb53124fe08ba10551e8706b5a7e12aaca59f56255c4e08c9225218d543a127e 01062048
- 02: e974db5de304ac0ea85afdd6d116c9adbeb4f60be5c25194795b59275ac57a7a 01204670
key image 01: 4147e55d21aeada7422412967a13dda8718fb4cafc3e3d384f3ffcf4e6ba48c8 amount: 20.000000000000
ring members blk
- 00: f7c54b4dc07e71c84f35ac02a4605b0bb80a78d18fb57deae69e0f1d34d5fa68 00368711
- 01: 98c6147ffe9703e58fa384ba80eeeb262b0b8547b0aec9167ccf96d88747f1fe 00450503
- 02: fb8bf9f8f492e4754c77dbfe1cc79d94076c4c76a656ebbbc0009767a3de0cdf 01204225
More details
source code | moneroexplorer