Monero Transaction b12c31305f7dda4d520435f64f53d2651b10f5e416f7ff284f6717dfb0b4152a

Autorefresh is OFF

Tx hash: b12c31305f7dda4d520435f64f53d2651b10f5e416f7ff284f6717dfb0b4152a

Tx public key: cfbe84fdde11cc1367f425271d7a274d1038aed4f6044a1f933bd855e519321f
Payment id: 85a9f099ec2aaa0d1d590bf839d73de7372e54f099aae04794b75d002885bb51

Transaction b12c31305f7dda4d520435f64f53d2651b10f5e416f7ff284f6717dfb0b4152a was carried out on the Monero network on 2014-07-29 10:49:49. The transaction has 3144000 confirmations. Total output fee is 0.009453310000 XMR.

Timestamp: 1406630989 Timestamp [UTC]: 2014-07-29 10:49:49 Age [y:d:h:m:s]: 10:128:18:18:10
Block: 149933 Fee (per_kB): 0.009453310000 (0.008996458587) Tx size: 1.0508 kB
Tx version: 1 No of confirmations: 3144000 RingCT/type: no
Extra: 02210085a9f099ec2aaa0d1d590bf839d73de7372e54f099aae04794b75d002885bb5101cfbe84fdde11cc1367f425271d7a274d1038aed4f6044a1f933bd855e519321f

8 output(s) for total of 8.159546690000 xmr

stealth address amount amount idx tag
00: 5ae8e1b6ce9ccfd6a8e1b660fe3943ffb4f223d1ae541c10c8e89b703d0cb98b 0.000546690000 0 of 1 -
01: acf37f3eef7d0d2534b3d7ba32656ac4d9744c5c54b06342550528cb80df47bb 0.009000000000 154207 of 233398 -
02: e5ea5d551813d90b3fa77a91694e082633f2e3b64ba073b04c92a40ef383d0c2 0.010000000000 320251 of 502466 -
03: 71872150364eb838ad751500626378c9d710aea6782125573703fabfc7a9e6e5 0.040000000000 126368 of 294095 -
04: 7080e8ccaed27f69a6d840fdfedaeb8fb752174637d8a9dcb7844acfa61ee269 0.400000000000 120959 of 688584 -
05: b648aec547ea07ec523d7b755e3d54862d18f3687fc9e5a99fa44c44afd35d13 0.700000000000 86427 of 514467 -
06: 8af6c7eaeabd1257808f8046520ff45dbfa7cba7bab89c3fc0b99022638192f5 1.000000000000 146295 of 874629 -
07: e06c566ba0aa74f54b0ba73c718d4c25affa3ef7deb605addc658dd75c46e563 6.000000000000 72258 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 8.169000000000 xmr

key image 00: 5c19722b79c6f5eac59c68f6a0faff304bf3fabf249464dd5c25da9a66f5ddac amount: 0.060000000000
ring members blk
- 00: bb57e4d0cf5bf72a62e1c1584086ab82b8bd61b673ffa5c349476595eab6dae7 00093846
- 01: 2c6fd43f51d1665210dbcdf10ebad7bf8ba1abf08cb7f59df62810243df078b6 00149913
key image 01: 75135b6181b051c03e8fdd736532c7cacc6aaa5e941bb5fb27d244c567b6cac7 amount: 0.009000000000
ring members blk
- 00: efc9f3ed6238f48e5edaf00f0841022094cc5b7fdd29b3c251925dcc8635d672 00054525
- 01: 799585d692f5d64ee5ed425fe2c22299a5300e6011c15a6aaed57dee41dbf48a 00149913
key image 02: 4ae161991e4a86b8865793159185548af4934f6c6fef247308654185a851f211 amount: 0.100000000000
ring members blk
- 00: 36d0f9210946fecf238545194ed06a0b6e706f427b79ef37a26ced40f91c29e3 00083387
- 01: 30c0dc6747a6dfa4597f7f3fd3558d3cd921095b463c9c2d18d172cc947d1619 00149913
key image 03: fdab8b7d4f750422b362244342a484fc8705d156694d0d9af7ec5da6c000ec10 amount: 8.000000000000
ring members blk
- 00: 12385626d2f9fb96630b2d5d86f2ed772c453d27d015c15917418cd95ddc2b78 00077487
- 01: 644097dad4d8243df08a53bf9804e519c1cc40f9d6bb1b8051600e994c8f272e 00149908
More details
source code | moneroexplorer