Monero Transaction 69f2b53243b06862ae5cf0a818d344dbca6fa892bc880cc4849da45111c33aaf

Autorefresh is OFF

Tx hash: 69f2b53243b06862ae5cf0a818d344dbca6fa892bc880cc4849da45111c33aaf

Tx public key: 48f4b5ffc96c8b312b6ca5134b3ea774729c24bd0aa6438309d88d94408b02fd
Payment id: 4628b61db38b4cc485321a85517bbe6d20d1ca5020dc40a9bfb0bc0d755b7040

Transaction 69f2b53243b06862ae5cf0a818d344dbca6fa892bc880cc4849da45111c33aaf was carried out on the Monero network on 2016-09-07 22:04:03. The transaction has 2245866 confirmations. Total output fee is 0.019372200000 XMR.

Timestamp: 1473285843 Timestamp [UTC]: 2016-09-07 22:04:03 Age [y:d:h:m:s]: 08:202:14:08:29
Block: 1131063 Fee (per_kB): 0.019372200000 (0.029519542857) Tx size: 0.6562 kB
Tx version: 1 No of confirmations: 2245866 RingCT/type: no
Extra: 0221004628b61db38b4cc485321a85517bbe6d20d1ca5020dc40a9bfb0bc0d755b70400148f4b5ffc96c8b312b6ca5134b3ea774729c24bd0aa6438309d88d94408b02fd

6 output(s) for total of 0.060627800000 xmr

stealth address amount amount idx tag
00: 38bc8e81d4459164c6ed2676b0a9ea875d9cf28a8e1520796a14775d554b6cd2 0.000000800000 6120 of 22876 -
01: c36d66a536052bfeefe024984c2c9b086aa34d23dc733479852bcd3714283da5 0.000007000000 24872 of 41473 -
02: a4f229ffccb8836f7531a559bbeb5261f1dd138cedc0faafe9433631f724b869 0.000020000000 42415 of 59482 -
03: f88ad0bc47bd8c60b27139a48b9d40dcafbba39afd17b4379bf14bc4362ae4d3 0.000600000000 52038 of 77842 -
04: 924e7088ab0f3447df09186fad22e540738585bf82bfe446aac86046694af534 0.010000000000 455224 of 502466 -
05: 09906514dc54e679f4fe0a7fb74772f84cca4b92be4d8e88ef2831e91218f1a6 0.050000000000 240666 of 284522 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 0.080000000000 xmr

key image 00: 6981af9aba5bc6a6cad62571cfd398f539041b613b742888f08a7f15e949eeb6 amount: 0.080000000000
ring members blk
- 00: e03d4b04661469c3b59840eb60683fe0b3ab0b88a4c8f4cceb75ec36fd571be5 00353399
- 01: 4c321863b7fcb45fdbfc4efd289d2255ef0c8c2a487966c0b7c32175ea2326d1 00730498
- 02: b33cf50602399aa240b5150b8e84f083070508f5f69e41c84eb37e9941339dab 00855370
- 03: 312ab63990b88922a1c92a6b70556953d064343a7a58130ccd6f453b9eb0e0e4 00906831
- 04: 3a09bd6ea7839c14970c47c03c52467c35a23f21cccb3902449b1621001ea4cc 01130872
More details
source code | moneroexplorer