Monero Transaction a120c2a41d286633bb5a2c71bc1b63a8f45926d9f8db0926322e8be5eb1a9836

Autorefresh is OFF

Tx hash: a120c2a41d286633bb5a2c71bc1b63a8f45926d9f8db0926322e8be5eb1a9836

Tx public key: 943737f93990ddcd0ccfa90b2ace046c31bf3451b83fef5b9e4f4f8e97b720a9
Payment id: 0bfbd6de22568ee54ced70dc81d14356b35a668a6422470d4d1a22268e592a3d

Transaction a120c2a41d286633bb5a2c71bc1b63a8f45926d9f8db0926322e8be5eb1a9836 was carried out on the Monero network on 2014-07-19 00:30:48. The transaction has 3143444 confirmations. Total output fee is 0.005852310000 XMR.

Timestamp: 1405729848 Timestamp [UTC]: 2014-07-19 00:30:48 Age [y:d:h:m:s]: 10:117:10:48:16
Block: 134852 Fee (per_kB): 0.005852310000 (0.006651238002) Tx size: 0.8799 kB
Tx version: 1 No of confirmations: 3143444 RingCT/type: no
Extra: 0221000bfbd6de22568ee54ced70dc81d14356b35a668a6422470d4d1a22268e592a3d01943737f93990ddcd0ccfa90b2ace046c31bf3451b83fef5b9e4f4f8e97b720a9

8 output(s) for total of 3.080147690000 xmr

stealth address amount amount idx tag
00: 6b352c114e172d0461424c0d33f4d7de62eaa7123b8254bb8332e911fe449428 0.002147690000 0 of 1 -
01: 6a9458e0af9f626d643f0f9a3a16f6e2fe50f69a9638d2139e00f7bc2b0710bf 0.008000000000 155714 of 245068 -
02: aa1c705d5fdbfb4ec4cf291a9ec8eecb146da585f17554e96704014f0d724f28 0.020000000000 200589 of 381491 -
03: a3977bcfdfd1e5d2626d3ec6a042adfdc45597bf00deaa7b0cb3cca8e1ddeb0e 0.050000000000 106424 of 284521 -
04: 58664a94bb72220b699dc4a3a4396cf7514476226fbeae3013987ff4e83ea27d 0.500000000000 139349 of 1118624 -
05: 56c826ae9614bea4f9cbbe99ccdf2f5d1b852386dc650151d1c695a6597b1c79 0.500000000000 139350 of 1118624 -
06: 5e46be1ad4592357724ae126c4120c772bde9ef071597b6ca00fe73c13fcb4a0 1.000000000000 114587 of 874629 -
07: 301386688adc0d58f54005ea1a587631909ac1fe26d548c8052651bdd526cace 1.000000000000 114588 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 3.086000000000 xmr

key image 00: 063aba8741046a6e1f74394785aa033b8b2122dd845ba11a09d7e8962f81677e amount: 0.006000000000
ring members blk
- 00: 88c91f4974a43fa729a5a6a1384737b32ab5d005c9159444648593997788c9f3 00074704
- 01: 30fc6a7b3be6822cbc1e722ad6f2ffc77f0d6c09e075a89c2c9f7398cff9444b 00134829
key image 01: 030a1a887911dd3f144f1fcdeb930ebfb423a7d6baa8ed09261a8697dd158834 amount: 0.080000000000
ring members blk
- 00: 87e2279f95ee4561fd6c33fe0c2e67ae7f6b34c750ef72186f28fc9ea062e400 00067611
- 01: 7b20463774a0e2ce91c405d4ea969f66be3d7fe0202e509d9b5603990c14d303 00134833
key image 02: 92c6fddcc8d6dc6675861deb066ae5f6c2244edee73f0e947424e8b85a1fe78b amount: 3.000000000000
ring members blk
- 00: e664fb469ad45c427762bf1b0fdd33da2f50093b9eef8f3f0aa19957f0390a19 00100344
- 01: a49ed64b15a90fb0dfbb991a746b92980f52b61730243dc3b2f761843fbdc1df 00134833
More details
source code | moneroexplorer