Monero Transaction b05093e499aa30539668a2702c57a7f7cee5814d305c6cba4d0db79fce3bc553

Autorefresh is OFF

Tx hash: b05093e499aa30539668a2702c57a7f7cee5814d305c6cba4d0db79fce3bc553

Tx public key: 6999b6686f411b08d8c2dfe6055cb5247cb5ac02fb57e552a7f960a84aa09c19
Payment id: 1a7a15e5153b20f48e0df550fbc7ca678df269923d3c41a260b27292d03a129c

Transaction b05093e499aa30539668a2702c57a7f7cee5814d305c6cba4d0db79fce3bc553 was carried out on the Monero network on 2016-11-16 05:49:50. The transaction has 2138068 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1479275390 Timestamp [UTC]: 2016-11-16 05:49:50 Age [y:d:h:m:s]: 08:052:12:49:11
Block: 1180739 Fee (per_kB): 0.010000000000 (0.009687795648) Tx size: 1.0322 kB
Tx version: 1 No of confirmations: 2138068 RingCT/type: no
Extra: 016999b6686f411b08d8c2dfe6055cb5247cb5ac02fb57e552a7f960a84aa09c190221001a7a15e5153b20f48e0df550fbc7ca678df269923d3c41a260b27292d03a129cde2001d206ac110ec153a6a2da99eb8f9589bc0b84f03eb7bd2c40c58dd4ccbfd1f9

6 output(s) for total of 0.704000000000 xmr

stealth address amount amount idx tag
00: fb44c34111cf09c7a3349f2c0950ba2e148b3085d3ee5c5a3e748366ff2a5009 0.005000000000 288547 of 308585 -
01: 5949cf54e8a4dca84f9a569564bb390d786fe254d9f1e0cea69fb4e148b99d31 0.009000000000 213092 of 233398 -
02: 9f6d5154a66079ba199e54d701e6a7a91fe7a9d3e9450daa51742e0e56e07506 0.010000000000 474375 of 502466 -
03: b615c298bbcb85e102b88a6cc1eb7189ef2382a863cd496de6194956cbde9e90 0.080000000000 246926 of 269576 -
04: 0820f09bbfcd35039bd73627607b4e836c05b386f35271dcd80db6ab15e2a961 0.200000000000 1212049 of 1272211 -
05: 3b4d3dc60e1ae294d41df44302faaa8f276f11309220984bbf5aa80cbc035ac0 0.400000000000 647699 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 0.714000000000 xmr

key image 00: fb029127a7c1023842a6401af5c744b339233465516cfe17c9533e440448c3f6 amount: 0.006000000000
ring members blk
- 00: deaa199d371fa3d965f4023517ca20028498379f093f0e09ca003446dfcda0e1 00057972
- 01: 14626148b150a117987f5befb5af4205bc03c259dbb306af865519e3524320f4 00080212
- 02: cfdfb12b60f18226ec5e0455a339a3ec49ff59d2da329f3202a67794eacc599c 01180435
key image 01: 2a77b2c93412adfd05c12aa8d57fdacb31d265d2ff44f8588b35cbd0665d0aa9 amount: 0.008000000000
ring members blk
- 00: 549cc9b1b263bf061f529967d30e5fb8aad14e2ec56abeee2a1fb6bb4c0594b1 00086616
- 01: 3cffc1776611b430a7eb47d6b5195d901aef0aefd5af6a2eab267d21e23c7c1a 00088502
- 02: 5e6029a29d0cfe627c5ef0b7b5c3b55d79a4db07943d3ffe83846e432e671201 01180731
key image 02: a233f716c813c78678254e75dbf4a476a3cc626741efd0ed2bf5295b183e27f6 amount: 0.700000000000
ring members blk
- 00: de472140232ae00c8ce092a60f11f54b0a36ea257db7acd21c9d3a24532ead4a 00176743
- 01: f19dfa3b155fbf76404fea1e72c5026d9a2883397c2124b7342be5ab4f43f9fa 00188091
- 02: 2285d748c2d50add6721216d000feb8b978354ac051f46162f825117847769af 01180698
More details
source code | moneroexplorer