Monero Transaction b084fba19c1b0302c91c807779dafbae534db8b839f97584a8ad115efa2f93cc

Autorefresh is OFF

Tx hash: b084fba19c1b0302c91c807779dafbae534db8b839f97584a8ad115efa2f93cc

Tx public key: 7749034b66d0323d10f2612769f35c2a2c85cbfe0b49ef1e49c75aa2f09e4b9e
Payment id: c16235619d512b47fcb1edc7f565b0c29d98576a41b3e84573694ba6b2b1af10

Transaction b084fba19c1b0302c91c807779dafbae534db8b839f97584a8ad115efa2f93cc was carried out on the Monero network on 2016-03-30 12:06:30. The transaction has 2275563 confirmations. Total output fee is 0.012519470000 XMR.

Timestamp: 1459339590 Timestamp [UTC]: 2016-03-30 12:06:30 Age [y:d:h:m:s]: 08:243:17:36:34
Block: 1014752 Fee (per_kB): 0.012519470000 (0.015807567546) Tx size: 0.7920 kB
Tx version: 1 No of confirmations: 2275563 RingCT/type: no
Extra: 022100c16235619d512b47fcb1edc7f565b0c29d98576a41b3e84573694ba6b2b1af10017749034b66d0323d10f2612769f35c2a2c85cbfe0b49ef1e49c75aa2f09e4b9e

13 output(s) for total of 59.987480530000 xmr

stealth address amount amount idx tag
00: b6bba4f5e1b214e02c9fd87370a256bf537ce51715ae87310419f3b53578a9fb 0.000000030000 1447 of 22502 -
01: 4e8d3ce21e4ce03800242257d6fcec97f22afbefa97fb32a06848d8acf668db8 0.000000500000 1317 of 22921 -
02: fefc9b20afd729ec21a631f01378a1e2663f53e44bc5b31ff628de3a77ad805c 0.000080000000 36737 of 59073 -
03: d617f861d3d5e704116b732017a325288c55279f73d8a40fd24de2543c35e3da 0.000400000000 37312 of 77134 -
04: e83166c4432af9337dcd30f600fef3e055366723194fc886dcc4d5072f02f1a1 0.007000000000 197331 of 247340 -
05: 0b9d35f4ed136c2c8cb37246b7bc40f59e42279f9acaf35b109e1c4cf27feead 0.030000000000 260359 of 324336 -
06: f2bfd96b066874631e72c1ca9d3e81480f28ba50cafe3059f42eba43182b88a7 0.050000000000 217368 of 284521 -
07: 8c51a2986d16638c2ed5bd3c92585978721ffcd8bcb203b04045ccb04d6c710e 0.200000000000 1101193 of 1272210 -
08: 1662f6b07d4cef3d55dbd6f2316f41244e45f53c482d1e1dda05bfbed921afd0 0.700000000000 430558 of 514467 -
09: ffe5aef030a662c509ffcf5b9c26c1c0a91936a0aefe0b1bd8a219618fa3abf4 4.000000000000 194102 of 237197 -
10: e7e48c77ca9ebfe15b31cdc4bbb70b9d9406b0e5d7d28f1e941a7c5cde4dd2fd 5.000000000000 206289 of 255089 -
11: c8395043cdde48066178df532ce58dcbbafaca2aa544f2321f911225d103e71f 20.000000000000 51860 of 78991 -
12: 0e0f1cb05a12a0b7e3d5a4e60aeaae6e47b148d95461bf00e6e43129402727b2 30.000000000000 30883 of 49201 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 60.000000000000 xmr

key image 00: 2a38bcbc3caada4380bd3b61232d680cda098cdaeda9a4057cc01323e82db084 amount: 60.000000000000
ring members blk
- 00: 261c52ffa7f3aa71ae2dfd7e28b34e06b47ab4e83d72824269e892b793efe760 00554415
- 01: e5539acd0c3de3f07ab09fa32796edfc436ed8c7281d9b691767777f0e44f124 00894678
- 02: e1d05478bd03e519e836bc1ef73d0c94ac1b00a8376be5d325f149bb1c20789a 01014384
More details
source code | moneroexplorer