Monero Transaction a1d2caba6bbf9fb80b923814ed1946eaecc1c5bfa87eb1524a603059c4904747

Autorefresh is OFF

Tx hash: a1d2caba6bbf9fb80b923814ed1946eaecc1c5bfa87eb1524a603059c4904747

Tx public key: 41d209bf757de1294203c0dd2bfa013ab86bc6108554ed3860269bb79eb9562b
Payment id: c7e26ce2cf071d8b8ca75ab4114fa7952e21ff211492bf28d015681b37b8b471

Transaction a1d2caba6bbf9fb80b923814ed1946eaecc1c5bfa87eb1524a603059c4904747 was carried out on the Monero network on 2014-10-20 21:35:41. The transaction has 3058644 confirmations. Total output fee is 0.144831430572 XMR.

Timestamp: 1413840941 Timestamp [UTC]: 2014-10-20 21:35:41 Age [y:d:h:m:s]: 10:092:18:42:32
Block: 269492 Fee (per_kB): 0.144831430572 (0.236534904156) Tx size: 0.6123 kB
Tx version: 1 No of confirmations: 3058644 RingCT/type: no
Extra: 022100c7e26ce2cf071d8b8ca75ab4114fa7952e21ff211492bf28d015681b37b8b4710141d209bf757de1294203c0dd2bfa013ab86bc6108554ed3860269bb79eb9562b

6 output(s) for total of 12.858673000000 xmr

stealth address amount amount idx tag
00: fd16c74194f626d522cad76481b4aa24d4406942955a909673c1818d3e371bc3 0.058673000000 0 of 1 -
01: f0fbfd9a2c9d5eb0432e8071816f37129a837aa0f6af2c0907b3d6aa8dad5b2d 0.100000000000 605872 of 982315 -
02: 0346109f807f8afd53a85e07ff0f37f2a83cee27b862a1ae84027d6687f1659a 0.700000000000 184133 of 514467 -
03: c62b53e2b368c8270dc27329a8da64d82f2349afcced086f9572b39d2e02ab7d 1.000000000000 310158 of 874630 -
04: 480fb9bd3db6a74571fbc98f3d129a554bcee70eee1b1e5521553bf605daeee5 1.000000000000 310159 of 874630 -
05: 5e2d7204a349039592f2bbacab2ac250d654ada86f8fa91f62e16bdf6d2049d1 10.000000000000 313794 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 13.003504430572 xmr

key image 00: 287194a901c646120bec37d56a7f5800011e13305cce6181c196345e439ba2d1 amount: 0.003504430572
ring members blk
- 00: fd409ce7cca789332303e2da848250228b2e97869e7a628ed94439874a0e16e3 00219481
key image 01: 0c05d60b7316571b463133bda94571f63c968e04e8da6c1efc5978f29df8d11c amount: 3.000000000000
ring members blk
- 00: a3f5ad7cf05b742734236b34b45dfd993b0ce1e990a3142f25f1b6bddd4644e4 00269058
key image 02: c7106d5d3dee51b41cae09f7fb19bac44af080a0544f6c7307c15a002563eafd amount: 10.000000000000
ring members blk
- 00: 1f7f9cfa4d647809b5972322226d5d7c941166c800a1d6495148de108a82d316 00269324
More details
source code | moneroexplorer