Monero Transaction 704d64ac90f39295ba013ba6952b8f45bb94f58ffba04856df58d952d4a80a2a

Autorefresh is OFF

Tx hash: 704d64ac90f39295ba013ba6952b8f45bb94f58ffba04856df58d952d4a80a2a

Tx public key: 282065ede55ea0aed7119982882484771e0dee01c3743c2ba83f47ce165d431c
Payment id: 96ec8e37c5e023f8cf285738a061dcacfe8dc3c7a003879b8fb5cde936656b86

Transaction 704d64ac90f39295ba013ba6952b8f45bb94f58ffba04856df58d952d4a80a2a was carried out on the Monero network on 2015-12-05 01:50:02. The transaction has 2523133 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1449280202 Timestamp [UTC]: 2015-12-05 01:50:02 Age [y:d:h:m:s]: 09:116:20:56:15
Block: 854805 Fee (per_kB): 0.100000000000 (0.154682779456) Tx size: 0.6465 kB
Tx version: 1 No of confirmations: 2523133 RingCT/type: no
Extra: 01282065ede55ea0aed7119982882484771e0dee01c3743c2ba83f47ce165d431c02210096ec8e37c5e023f8cf285738a061dcacfe8dc3c7a003879b8fb5cde936656b86

7 output(s) for total of 5.400805715584 xmr

stealth address amount amount idx tag
00: 109472a834150015d3ae86f20b64c59b852eeac82da65b823e5f860f264a07dc 0.002065473161 0 of 1 -
01: 3d7be964f05ede2dbf1b7f115762a121fe7c0d3089da4c7784794b3fc9008c50 0.400000000000 521622 of 688584 -
02: 87e5600c462dfa874a238cdb5c81c7d4bddfb0624e16a9609229785ba32f9ceb 0.000740242423 0 of 1 -
03: 96696639a358f1fdf27f2dd7074ea3412594874942c57e7db8d733a404c989db 0.008000000000 185020 of 245068 -
04: ad5b6f029053e525a26fc95e71e99ba744659d44b21c2a9bae76656d55c0cec7 0.090000000000 201077 of 317822 -
05: c670d986c29ba672843c6fe2968230c6a866d4fc303ad110ab3fccce842e1e96 0.900000000000 321632 of 454894 -
06: f472a122d746ddb49262fc114139daa7a42152c66fbb60ff393d078337a94fdb 4.000000000000 181762 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 5.500805715584 xmr

key image 00: c076a05d73e5cda67127503d2de0522a95db83b49656d5d652af64644f0b927b amount: 0.000805715584
ring members blk
- 00: ac4ee6ecdbdadd2d664ace7ae4ec2b94f8071c2c2b9333ad89a1ab93e43cd976 00849375
key image 01: 6e7b250a6b0826a7e88a74cba4b0f82060887d847451336e84bb99c16cd3c963 amount: 0.500000000000
ring members blk
- 00: 4b0970ba9cf7161e5ccec48be8b38559f18c413c11d4f9b1046796ea32edfa20 00853141
key image 02: 772af04671d85fabc879dc6bdf4751c101273fb867aa1c69dbf02dae95206a04 amount: 5.000000000000
ring members blk
- 00: c5f2ab5ec2d50de42f12001119d736563a82bb9ae4a6bc7b437a4456e255f682 00848790
More details
source code | moneroexplorer