Monero Transaction 57912b8093ae3bb3aef163e199b93e71952d678bf0bf3dff3f1e087ec2d375df

Autorefresh is ON (10 s)

Tx hash: 57912b8093ae3bb3aef163e199b93e71952d678bf0bf3dff3f1e087ec2d375df

Tx public key: 62fa3b42179165ed21709f84cffd96957f6a966e85e9c4a790f588391f737b19

Transaction 57912b8093ae3bb3aef163e199b93e71952d678bf0bf3dff3f1e087ec2d375df was carried out on the Monero network on 2014-06-11 05:08:00. The transaction has 3222867 confirmations. Total output fee is 0.005886526418 XMR.

Timestamp: 1402463280 Timestamp [UTC]: 2014-06-11 05:08:00 Age [y:d:h:m:s]: 10:189:16:23:25
Block: 80122 Fee (per_kB): 0.005886526418 (0.004683607655) Tx size: 1.2568 kB
Tx version: 1 No of confirmations: 3222867 RingCT/type: no
Extra: 0162fa3b42179165ed21709f84cffd96957f6a966e85e9c4a790f588391f737b19

30 output(s) for total of 3.994113473582 xmr

stealth address amount amount idx tag
00: f883c1b126a0bd7e48d214805d6927c29b6b0365df598c347c50981d9270d8e9 0.000299809791 0 of 6 -
01: 218ee5a020a2acf3bf11d53873ee17680687cf4079e739e17b85e319c9f4caf5 0.000299809791 1 of 6 -
02: 78a5745e317391a59948a7efb4fb500b25479a46b215be2933d4edd2cca2a22e 0.000299809791 2 of 6 -
03: 774ac8cdeadf980b74e06f7b04ae37c95fd807b9e365d85a687a49d809c02621 0.000299809791 3 of 6 -
04: 717cc25758d9053e59e16414b12a10d39ba0b8c3f53cb7adeee4558ea45e3237 0.000476223893 0 of 1 -
05: b49ce444b05dfa9d28d50bca5057feae0900e0268260d734fea365c15e2343aa 0.000590109139 0 of 2 -
06: 3fed2a43a80615db341ec2c27a11e94f8c5707d1f230e486205f77212a73cf05 0.000599619582 2 of 7 -
07: de2a6b3e9d2cd74e86092f20180edfe0d114e10e42a65470e491ab97652abe40 0.000599619582 3 of 7 -
08: 4edf619e7f8d7f553244da22576cda6bc23fc6539fc8eea4c59ee1f83865fc04 0.000599619582 4 of 7 -
09: bec90e7f304179d25a4a05425bc674619a5f7d56a78a608432924b438feeb6d2 0.000599619582 5 of 7 -
10: c93ceaf1b62a049d8651d573b4523b5c2048c9ce3b0d7aa56543cfc7b4fee38b 0.000599619582 6 of 7 -
11: 2d9ab1b2a7afa32a43de1c24acc1b7cde454f67577eae07825b9284cc589e742 0.000650735907 0 of 1 -
12: 167901d5f676efb4b3f3b605d0d075e45c6b71562459a6b171233a5811277bb7 0.000880408488 0 of 1 -
13: 4a2b9aaeb887d61f5b1dfcee00c3bbca3864f0858c73fff2e526f6a1377e4aa4 0.000899429373 0 of 5 -
14: 0488ab7d57f17f4dd60a44d7fd8aa1867509a2ac004246749bb09071c58271fd 0.001199239164 0 of 3 -
15: c49755576b563d3ae642aace9de318a38ad07c1b9112eaaf95ff89277aa6463f 0.001274191612 0 of 1 -
16: 6dd7c4b90c4d6fa97c899ed5192ec3715cada93f7f4c6118a4732b729bec43b6 0.001649793318 0 of 1 -
17: 014c97f7533f2043c73e95b35d151b21d8e91781c84d0dc169e5fd827697edf8 0.002098668538 0 of 1 -
18: 8f74972a5cc41d103720a6f2d77580689ef95ac8137f6da28ada1bcaeaaeabd9 0.004197337076 1 of 3 -
19: 75f0d5f27c1cf69beb2f3ff5c7881edca1429b13dce848a0e2ea44dcf2c8f4c7 0.005000000000 87171 of 308585 -
20: a34c9b9a6c38ba8540d262d9f867388892f9fd26f674dda4b465cd49ea9ab793 0.007000000000 77989 of 247341 -
21: 815c6925c5c2ca325a69a8d15b5c8ca6873a0fc3f6927edf019412d6c57f0d5e 0.007000000000 77990 of 247341 -
22: e30c785218b680e221356c90a0ef9a89ed4c1f70ae3c6497af5b579501186233 0.007000000000 77991 of 247341 -
23: 3cafbbcd87e5a9bed1b7b3d57c1a64432babfad9ec7a5c751a151d087bfb80dd 0.010000000000 152699 of 502466 -
24: a6718897f0e7f7b663222766e161aec613c18872846f48a39196b58dd44fa5de 0.010000000000 152700 of 502466 -
25: 8ca6b24fe1e1711206967b117945df6189380fd9013a695abf56e777eb1a72ff 0.030000000000 69820 of 324336 -
26: a936978188407512fca53a160e9095ae8ff5caa070ad4dbcf5274be721b86f0d 0.030000000000 69821 of 324336 -
27: 029184643294c84930ee9f96c396dfb709aaf7d5afe92578f1fe4487e24bcce2 0.070000000000 38494 of 263947 -
28: fdb124255632e739f4e938b5fad39e2391f543f1827895c4f6505e2e40543be5 0.800000000000 14857 of 489955 -
29: 3f49b4ec670fbf2f92ddc04cbf4fac79d1849e9678d52c2e0db7397d3d0fe605 3.000000000000 7069 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 4.000000000000 xmr

key image 00: 33021e54dd54fb22062dd23cdb18a76512cc8ad172eb15111e7246bca03097ba amount: 4.000000000000
ring members blk
- 00: b215ec9a375b86c019c678f8ea97564804865dabf00cbaa3209201ab048de107 00080103
More details
source code | moneroexplorer