Monero Transaction 5a85c05d11606d9c7afe6369f0b9e21fc5a96dbaf258a271e79db4a66cc3c3c9

Autorefresh is OFF

Tx hash: 5a85c05d11606d9c7afe6369f0b9e21fc5a96dbaf258a271e79db4a66cc3c3c9

Tx public key: b417b7b48d58b2db1ceff3ff59cbfcf047ddabe6f4648d872e83938138fb35cd
Payment id: b00c192840ba04b6c89c8ff070e754d114010b397a3aaa7c5800096217b63579

Transaction 5a85c05d11606d9c7afe6369f0b9e21fc5a96dbaf258a271e79db4a66cc3c3c9 was carried out on the Monero network on 2016-09-04 10:46:37. The transaction has 2166315 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1472985997 Timestamp [UTC]: 2016-09-04 10:46:37 Age [y:d:h:m:s]: 08:092:00:00:04
Block: 1128551 Fee (per_kB): 0.100000000000 (0.189279112754) Tx size: 0.5283 kB
Tx version: 1 No of confirmations: 2166315 RingCT/type: no
Extra: 01b417b7b48d58b2db1ceff3ff59cbfcf047ddabe6f4648d872e83938138fb35cd022100b00c192840ba04b6c89c8ff070e754d114010b397a3aaa7c5800096217b63579de20214b8decfbbddafc9b7f2a3457d47469edc772bcb89a105d75370befebd8a6d3

5 output(s) for total of 1.900000000000 xmr

stealth address amount amount idx tag
00: 3304f855e2e407c5269def118326a6ed4442cb8d369810d6ba438fe19112a113 0.003000000000 55647 of 90176 -
01: 5616b7570da8ce61487d0e47cb1ccdc6ad874376548b808d0b4d017b66d6de6b 0.007000000000 211670 of 247340 -
02: 986fc4de19bfb646092475533269c183905cc69e6adbd74ff22f586003164d6c 0.090000000000 251128 of 317822 -
03: 77885d9e952d70de8c805c06f1d889a098cb7412a173bd5c719dbe50d0a026d3 0.800000000000 439756 of 489955 -
04: a21c0fa703efccc3e20d0a43daabc26a7d5ba3c9a4b7ffd868285ffd04e0acf3 1.000000000000 787912 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 2.000000000000 xmr

key image 00: 4f0fccc845015eb8f07957eec04d74c935e9d9a8d9c9a1cefd454bc8d9675737 amount: 2.000000000000
ring members blk
- 00: e76bf0ae71d3ff6813672123049068a3034b543ace81d99f92b8d7ecd19ba7e9 00363699
- 01: a1a6eb2c7a0c2cef347a261cb52a2d533c805d5b005e5063174ea0e1c342ba83 00800123
- 02: 1a26287ded5dd73fc4591fad61b5f00bf4d319a51f1764d264c842aa4bc91057 01128083
More details
source code | moneroexplorer