Monero Transaction 945d6741651f0105e41cbec2ff020f692722ae688b8020d6afa8cae88ebffc45

Autorefresh is OFF

Tx hash: 945d6741651f0105e41cbec2ff020f692722ae688b8020d6afa8cae88ebffc45

Tx public key: c4290462d30bb9478a6840145b86fa86c9b66e494fd81cc94ecf6d38915948a7
Payment id: 4d46e4dd2558e8092d3b2fd92727ba635d3ec1101afca8dc74ae4d59727951d0

Transaction 945d6741651f0105e41cbec2ff020f692722ae688b8020d6afa8cae88ebffc45 was carried out on the Monero network on 2014-08-19 02:15:40. The transaction has 3138997 confirmations. Total output fee is 0.009679260000 XMR.

Timestamp: 1408414540 Timestamp [UTC]: 2014-08-19 02:15:40 Age [y:d:h:m:s]: 10:142:05:38:28
Block: 179476 Fee (per_kB): 0.009679260000 (0.015132156092) Tx size: 0.6396 kB
Tx version: 1 No of confirmations: 3138997 RingCT/type: no
Extra: 0221004d46e4dd2558e8092d3b2fd92727ba635d3ec1101afca8dc74ae4d59727951d001c4290462d30bb9478a6840145b86fa86c9b66e494fd81cc94ecf6d38915948a7

6 output(s) for total of 5.790320740000 xmr

stealth address amount amount idx tag
00: 73743e652cf7dec398931516e0ab7d5890bb8ed1f1c8f4fa3a9afd3428832e49 0.000320740000 0 of 1 -
01: 57ba8ffe8a8989404b729cd3d6c49d9f6ba7d85bff4f067977f0cd7e8b63f47e 0.040000000000 137185 of 294095 -
02: f0708b510dc7ccacc37e238ff95e7705f1284b6a982f28c85e706878e11c7efa 0.050000000000 121344 of 284522 -
03: 1cd875375a72e9adb3752f864b50fa9e82d3b9fb9b310b48ef2b532b37aed914 0.200000000000 382532 of 1272211 -
04: 60068b6224e42e2f18fc03cfad5ff007b896d6be0d070634c0d0d15e232a2c3c 0.500000000000 236108 of 1118624 -
05: 6c732585e8b55e279513f6368583b2eb52ca64406455507f819d42d63502467f 5.000000000000 105382 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 5.800000000000 xmr

key image 00: 5498b26f425eb3d23b3329934cd1c80a1373e5e5ac7f6c06d7511c28a793dab8 amount: 0.800000000000
ring members blk
- 00: e78215629ae8901f9c35471d3597e08f2696a0d5aae213aac01217b7d037ebc8 00149377
- 01: 19616a9ff1cbf8d40cf6a935386b0c4f9073ec6b3125d6cafbf7ed996c4e4b98 00178828
key image 01: 69941019c5d12ab3b4f50d7117ea863fb66acca2037b7c420310b59419cf5d88 amount: 5.000000000000
ring members blk
- 00: 665124d96e86dd40a8c061221798c4724d76ef643944383880baf89024e28ccc 00086188
- 01: 4e2c4ba3bf5695344def28d3357bf5d02f10c52d34e5c056e6f17d25541ecec0 00179202
More details
source code | moneroexplorer