Monero Transaction af13ded68df1a1e25b7cb89c5641a448c5a695efba740d7201c905c86dfcfd4f

Autorefresh is OFF

Tx hash: af13ded68df1a1e25b7cb89c5641a448c5a695efba740d7201c905c86dfcfd4f

Tx public key: 64de48b33be5bdcf26f6fbb420e9133dd30cccd0cee9dd7d93b5b92262904454
Payment id: dc51c3bba488cab13b1cf0e704d767c976e185baafb06175544fd272bc782833

Transaction af13ded68df1a1e25b7cb89c5641a448c5a695efba740d7201c905c86dfcfd4f was carried out on the Monero network on 2016-08-25 05:43:36. The transaction has 2173993 confirmations. Total output fee is 0.035712160000 XMR.

Timestamp: 1472103816 Timestamp [UTC]: 2016-08-25 05:43:36 Age [y:d:h:m:s]: 08:102:09:36:10
Block: 1121009 Fee (per_kB): 0.035712160000 (0.031255770803) Tx size: 1.1426 kB
Tx version: 1 No of confirmations: 2173993 RingCT/type: no
Extra: 022100dc51c3bba488cab13b1cf0e704d767c976e185baafb06175544fd272bc7828330164de48b33be5bdcf26f6fbb420e9133dd30cccd0cee9dd7d93b5b92262904454

16 output(s) for total of 2999.994287840000 xmr

stealth address amount amount idx tag
00: adf640d2432869a7752905df8e78828f431b2b2ca56536d36247130fecc39f1c 0.000000040000 4812 of 22714 -
01: e4c0f1f4e3e8352b7831667f42189567280da982fa6ae20903d646c7c99befc1 0.000000800000 4734 of 22876 -
02: 9c54bde717e978a0f9e86a6a89cbf94e489c007f2ab18b25c3139856c5dbaf0b 0.000007000000 23451 of 41473 -
03: 15953feceea38c74524095be9b95bce050b9c22322b89b9261f4f47586df5ded 0.000080000000 40303 of 59073 -
04: e82c1a8180d89b582c2d837b6116db68930f36ae61a4e2f19c3c98b0560ab81c 0.000200000000 49733 of 78038 -
05: ddcd757fdc5057c5eac6c44710c7f35d7498422aecc0b30c7e0a856023ba815f 0.004000000000 50602 of 89181 -
06: 5163b29ec00bfbad4ef8dcbba0fabadee0fac18d4e4e052688639434113eca15 0.030000000000 278585 of 324336 -
07: 58572f8a9edc718704d1312cda8ad61e7f6bed69a17ca1ca62c42cd361999c66 0.060000000000 220379 of 264760 -
08: d811d2006b515ee189f6d34042db786f5ccfa2f3b8abb8af17c97e9764af7b71 0.900000000000 387332 of 454894 -
09: 0b76395515185fd67b60ed11aef7311a576f1c867080b33b076002e886be285c 1.000000000000 779155 of 874629 -
10: 85c114ef3eee8aa0bc054fcfd1f2feabed308dda44498476bb88c76e2d602ded 8.000000000000 199431 of 226902 -
11: e9b4d3c5b84fb664b50b7c3b7d93cb17f6a04c95e64fe780d3cd5d0a870f4f73 20.000000000000 61328 of 78991 -
12: 099db3c603d4191364156f0fb1746015663344d825b2bf0f145d3446ffc1359c 70.000000000000 16542 of 24819 -
13: 2f94577c85877af1f7d102f16c6f9a5833c682fff41566bed6b1f40d6f2a55f9 100.000000000000 40775 of 57197 -
14: a8d9143eb6aba1c9297800cac7fb519e6422383f6607bcc23eddc384917416fb 800.000000000000 4007 of 5826 -
15: b026eeaa7cc992cb35114a426700c79e30d3271525792b7549cae990ba2f2725 2000.000000000000 3172 of 3772 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 3000.030000000000 xmr

key image 00: 8bcb5b740650f76ece3c172e29beb48ce57e9ddd093e559df5e55ad36eff71a7 amount: 0.030000000000
ring members blk
- 00: 76c410a3402b15bb6a909e0eb41ff5e9b0820a093febe8847862621c2f70238b 00084645
- 01: 88a56364e00ff85aa8b60a8d36ffa3a8e9fbf573cb488cefd1b799d69d7fd084 00087412
- 02: 61e8c102dd579b018a4fe70d5568a1ee719ec510d00fbcd9443b4132651c670a 01118836
key image 01: c8b54eb7066ae22628cbe288133855ae7e27b6c27c0e06bae6fc710c81015c88 amount: 3000.000000000000
ring members blk
- 00: f3e3fbdac34c8a1714eda0cb227757c90077161a7512d78c1186d955527675b5 00569673
- 01: 26eca28859ee3e4b98eb1540bc87b0c06926f1cc1d36d44247df68a5faf45efe 00983878
- 02: 30fc1738c99f979cb2d40271d0693566c076ceba3f25368551d028ab1cbf83f5 01120869
More details
source code | moneroexplorer