Monero Transaction af42780d30a6a164cf7ede09b0be9f21e5671946bd8c4c61d6eb49d9d2f17863

Autorefresh is OFF

Tx hash: af42780d30a6a164cf7ede09b0be9f21e5671946bd8c4c61d6eb49d9d2f17863

Tx public key: 8142cfe156c9f3904536a6c30af2ae19d7ab540595cd9162371cce7beb5efa87
Payment id: 5c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088

Transaction af42780d30a6a164cf7ede09b0be9f21e5671946bd8c4c61d6eb49d9d2f17863 was carried out on the Monero network on 2014-07-28 21:20:31. The transaction has 3152202 confirmations. Total output fee is 0.007446700000 XMR.

Timestamp: 1406582431 Timestamp [UTC]: 2014-07-28 21:20:31 Age [y:d:h:m:s]: 10:139:14:15:36
Block: 149085 Fee (per_kB): 0.007446700000 (0.011695430675) Tx size: 0.6367 kB
Tx version: 1 No of confirmations: 3152202 RingCT/type: no
Extra: 0221005c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088018142cfe156c9f3904536a6c30af2ae19d7ab540595cd9162371cce7beb5efa87

6 output(s) for total of 9.012553300000 xmr

stealth address amount amount idx tag
00: cfda7fc523999c8f7194f9cf848e6c16278e5bb13ede5e4913e2dca7dae7d1b2 0.002553300000 0 of 2 -
01: fe588ec267ebf754727fd96f2611b658361c8c59919521ec1a1e1e7bec3c67ec 0.010000000000 319867 of 502466 -
02: e2a322b0ddb5e6f39f55927b4368c7a44d3f9b624855a18536c68ceb6f9f81fa 0.100000000000 332023 of 982315 -
03: 266d8782df02187cc97aabdf8ba63ce105a8bd0a5c908256152867b731cac3e7 0.900000000000 68645 of 454894 -
04: c23204d688d6ea121547eb339dcb70095101f8f56800bd6cd467dea955b1e0bc 1.000000000000 144284 of 874630 -
05: 501aed4d1b29c01dde4b1f8b45f35e57ba45870acaf602ea0d9973c86c1a28ea 7.000000000000 47111 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 9.020000000000 xmr

key image 00: 2eed9a6718dd900a408a59ec13248db98b4e859619e015fb4e7abefc63c4a258 amount: 0.020000000000
ring members blk
- 00: fb10c7cbece1443d5c1fc02f7905518b3363065ceaaca2a70bba0ba4ddd950e2 00093920
- 01: 42af4a44cdf26d64f91a2a517004824f44b81da93e91e5e37be50ebdd4aa7b1a 00149043
key image 01: 6fae99a85f7e02817e2aaa7f9af73b007584e7b6c26c16f6526277d6d6047b8c amount: 9.000000000000
ring members blk
- 00: efa1d86a038c03b131fc638fa79e0425a27c251859b920ec4224c90ceb6966d0 00083060
- 01: 8b6894ebf20df5ceb1f052e5aba347222ec1f42b5adff27caeaacf4aa6d6e1e0 00149072
More details
source code | moneroexplorer