Monero Transaction 889fbf388951aa1f429673bc6c13f52effe411c58cb96f0267f420b412aeb16b

Autorefresh is OFF

Tx hash: 889fbf388951aa1f429673bc6c13f52effe411c58cb96f0267f420b412aeb16b

Tx public key: 2067875c586e5e861e155a1376ba2ac5a3a6288a2cefa6bea3d69afbc3201d53
Payment id: b063498ebaf012617f9c18da8e3ea5d64ed8fca68080570ba3a2309413c4f3a2

Transaction 889fbf388951aa1f429673bc6c13f52effe411c58cb96f0267f420b412aeb16b was carried out on the Monero network on 2014-08-07 01:50:14. The transaction has 3128284 confirmations. Total output fee is 0.009929930000 XMR.

Timestamp: 1407376214 Timestamp [UTC]: 2014-08-07 01:50:14 Age [y:d:h:m:s]: 10:115:11:40:23
Block: 162285 Fee (per_kB): 0.009929930000 (0.021317082432) Tx size: 0.4658 kB
Tx version: 1 No of confirmations: 3128284 RingCT/type: no
Extra: 022100b063498ebaf012617f9c18da8e3ea5d64ed8fca68080570ba3a2309413c4f3a2012067875c586e5e861e155a1376ba2ac5a3a6288a2cefa6bea3d69afbc3201d53

6 output(s) for total of 1.990070070000 xmr

stealth address amount amount idx tag
00: 01fde673d3f31c7289af6486c7ecca16648f5ca04dd00718b244a110bdeeb8ce 0.000070070000 0 of 1 -
01: 59adf67b03248b5f2d402d028e5ae58b986fdaf6fa95a6772f6cb6ee8e84cba5 0.030000000000 158869 of 324336 -
02: 4b951bbb7c79e6847f5ff740aee90ae001243ff1ff427360641f217ec975bffc 0.060000000000 101752 of 264760 -
03: 522dab4ac1d14bea01d21a436953769e995f2a4ce3c9b8c53f1cf4ccb534283e 0.200000000000 328867 of 1272210 -
04: 90d76586241f1ec986e7f0f66ae3e8120cc3ca4ec39c08f7d50603154c165760 0.700000000000 98417 of 514467 -
05: 5fe0665d8a0c2bc7eeb7d75433bdc2b284a106a74e49048714698ede30492b40 1.000000000000 170926 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 2.000000000000 xmr

key image 00: 2a28d16cc62df156e0d522c49f0909c535a1b264ecdf577e9c8f880616b8670a amount: 2.000000000000
ring members blk
- 00: ca655110de3f52a4b8bdde3e81d61e0959c524030f43bdb7fc8e619565599afe 00057075
- 01: b701260b33dc8d00a09e123fb2f647bc6872a1eee0796fca6dcbb4dae1a8153e 00162187
More details
source code | moneroexplorer