Monero Transaction afdf05c2e19b7b11962b9aecb267d15074514d1eabf725f414f7d7e01b534b03

Autorefresh is OFF

Tx hash: afdf05c2e19b7b11962b9aecb267d15074514d1eabf725f414f7d7e01b534b03

Tx public key: 51ce4904fbfd6cd0f2dc72b9f7a74b6f8c24cdfb77eb6cb6ec3c191eb84714a1
Payment id: dc02ad7ac3b6509d2a5768b48f1f6124d2670d1c1c26dc3f686d111a13a84cc1

Transaction afdf05c2e19b7b11962b9aecb267d15074514d1eabf725f414f7d7e01b534b03 was carried out on the Monero network on 2016-01-02 15:39:41. The transaction has 2406139 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1451749181 Timestamp [UTC]: 2016-01-02 15:39:41 Age [y:d:h:m:s]: 08:346:23:30:13
Block: 895271 Fee (per_kB): 0.100000000000 (0.184837545126) Tx size: 0.5410 kB
Tx version: 1 No of confirmations: 2406139 RingCT/type: no
Extra: 0151ce4904fbfd6cd0f2dc72b9f7a74b6f8c24cdfb77eb6cb6ec3c191eb84714a1022100dc02ad7ac3b6509d2a5768b48f1f6124d2670d1c1c26dc3f686d111a13a84cc1

7 output(s) for total of 2.904284473690 xmr

stealth address amount amount idx tag
00: 45c1802d92832bb31361ae46945415604389d338138c34bcda0ebe00e66cb298 0.003645260792 0 of 1 -
01: 251b8850f178b6d3e897889a333bfffd354bf522a8501f4600ae9ee42f806868 0.070000000000 176837 of 263947 -
02: aa5d0ae6265853e56a8316dbedaf6ed585892889ae2bfc20459bac1867768570 0.100000000000 843427 of 982315 -
03: 014efa2501dea12493d3ccca0512fadcb24b992f782dd35c95405e86775feee7 2.000000000000 313107 of 434058 -
04: b27e590ea500b8e28b0f26ce40593e43c55ddfb5000756d8aeda03843ce5aa97 0.000639212898 0 of 2 -
05: d3c9a1ec33bef176c820c59d8416496e758aff0e40d910e0ef0836209ce009d2 0.030000000000 242239 of 324336 -
06: dbd8c0e0ae8ff641a8fcd9f28258ab57771ca034fa60948d6c7add4a9840565e 0.700000000000 404833 of 514467 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 3.004284473690 xmr

key image 00: 5d5b096c1e251a8f4963158f912bd17813832918821907473396d6fa302d02e5 amount: 3.000000000000
ring members blk
- 00: 797bf3fd352cb5496f20b67d58a38b14203768c6911ddb0daef265ff11e0d74e 00881970
key image 01: 02600d249d4f733c3c71f80f1b10469384c7db5912b2784d857042c5d4e839d1 amount: 0.004284473690
ring members blk
- 00: 686acd969f52f73cbb2acee2f42e5a6cfb298512646d9cd02f9349dfdf5ecf98 00895003
More details
source code | moneroexplorer