Monero Transaction a4fbbd2a4f694a5db5f2ff95460a147763d099713e005fa1c8302e7e34808c2b

Autorefresh is OFF

Tx hash: a4fbbd2a4f694a5db5f2ff95460a147763d099713e005fa1c8302e7e34808c2b

Tx public key: da2e3e49704e27e2e2c163d9648197ee457cc15633dd34ad9c13cc8cf11fc63c
Payment id: b1a4262d6332448cb316d441c83323d8e52242c7a4db42748f19be1aedc07338

Transaction a4fbbd2a4f694a5db5f2ff95460a147763d099713e005fa1c8302e7e34808c2b was carried out on the Monero network on 2014-06-13 00:45:50. The transaction has 3160129 confirmations. Total output fee is 0.005070000000 XMR.

Timestamp: 1402620350 Timestamp [UTC]: 2014-06-13 00:45:50 Age [y:d:h:m:s]: 10:104:05:45:30
Block: 82734 Fee (per_kB): 0.005070000000 (0.000430202188) Tx size: 11.7852 kB
Tx version: 1 No of confirmations: 3160129 RingCT/type: no
Extra: 022100b1a4262d6332448cb316d441c83323d8e52242c7a4db42748f19be1aedc0733801da2e3e49704e27e2e2c163d9648197ee457cc15633dd34ad9c13cc8cf11fc63c

1 output(s) for total of 3.000000000000 xmr

stealth address amount amount idx tag
00: 30f57322dffa96417cd2e3db8bae98604448f6904c9d965686a4dd77206aae29 3.000000000000 8004 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



113 inputs(s) for total of 0.525000000000 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 2eab99735eeb4237de51e3ab770654921e0a3c674fa40ad17212f4913ae8316c amount: 0.005000000000
ring members blk
- 00: 64bb70b1908840ab8a998808c0786da45f64114f6fb428024e74a4dbdf4c6a2d 00079905
key image 01: c7ccfbf6763c45bef47ada184af504fbcd56a04fe564ded5437d7e7f59e863a7 amount: 0.070000000000
ring members blk
- 00: b374c4a5111bced762de855c408c156476cb612aa9821634a8692079f4af700a 00082716
key image 02: a5c7b4356418cf0bc7f80c2eccaa15ae2b090ba197ec9fa4e503f5296ee21cc9 amount: 0.060000000000
ring members blk
- 00: c6c31cdc00a77634bc2d2a93a2bb98bea400c7a18f3eeb080e5f70fbde1567f5 00081993
key image 03: 859b37d83ee51fa5f0db380ecfe05dafd1cf737c7fb1ce6e7b9e318bc0771f5a amount: 0.010000000000
ring members blk
- 00: 3def04afd8ec9213b07c26211f3d906f1aac099a43871dc1f643103eddee595e 00082077
key image 04: f9361a3f6111d09ae2af0e87253f6a0d86405bc8465aae401cb34a132a5c587f amount: 0.070000000000
ring members blk
- 00: 43ee260bd652120d1d460fc0c6e5f8ae872f41d9d71ead6305d8ea903219e5f1 00081893
key image 05: c65ba881b3ef7671fb38ac8c62f0b866145816e7bd9203500407041f92d8e0cb amount: 0.060000000000
ring members blk
- 00: ee01bd473bba5229978d606879c4e17be81208c22f5aa8cab79bb9f23ced6ea1 00081306
key image 06: 61aad6eeb98e3881d648a6a72e104fb533ded346bacea041fdfa1b2cb0c8cd50 amount: 0.080000000000
ring members blk
- 00: 25975e117b3f4baa09cd3b82ce74f2b5e57fd9d85a3e1ba9c53d82c4abd9625d 00082418
key image 07: c706ecbc9a6a3ae1e554aa2d61008792e6419dd9473a89cc7d0d561db7041d0e amount: 0.030000000000
ring members blk
- 00: 654e174b86fa6bff18a9d778cce7fbaa9821df6439e91ae76ac90bc42fa8f5ad 00082196
key image 08: 7a08f230e8d2b35f25998e49fa22aeb0e4d4a0e592a5cf2dc73637f604265f82 amount: 0.060000000000
ring members blk
- 00: b91682f4dddb15789fb35cde9a06b0d68847b6d3dce1474d8e9ffa330e573a8d 00082178
key image 09: 2b0ea258108fe32a2035f72428969b7362f15908bd13e3b1dad09c82366c9bb7 amount: 0.030000000000
ring members blk
- 00: 3d22923bcb90eba5df4e3f7a19fe88b74dc31e10aea124f369d881f66a02b44d 00081284
key image 10: 9e669c983a06a018a14d48cd6c488de7005245cfe055a70d50979e7e873e89b6 amount: 0.050000000000
ring members blk
- 00: f3b499666273c03513560903ce85250ab482cfd7cf7934242d334746c52c15c9 00082549
More details
source code | moneroexplorer