Monero Transaction b1afa2b9153fef24d3bc6cff0aa2acab4b96904e7e1bd5c80d9f3100dd389cdc

Autorefresh is OFF

Tx hash: b1afa2b9153fef24d3bc6cff0aa2acab4b96904e7e1bd5c80d9f3100dd389cdc

Tx public key: 842ed618bfb787039fb3fec06826abcbaab457f27b9619ece596eb79bc4edb5e
Payment id: d4410e902528efa87687df756125cfbdbaccaa83e579ae9766cd3436becb54ab

Transaction b1afa2b9153fef24d3bc6cff0aa2acab4b96904e7e1bd5c80d9f3100dd389cdc was carried out on the Monero network on 2014-08-12 21:19:15. The transaction has 3122614 confirmations. Total output fee is 0.005735230000 XMR.

Timestamp: 1407878355 Timestamp [UTC]: 2014-08-12 21:19:15 Age [y:d:h:m:s]: 10:113:09:10:48
Block: 170640 Fee (per_kB): 0.005735230000 (0.004363206181) Tx size: 1.3145 kB
Tx version: 1 No of confirmations: 3122614 RingCT/type: no
Extra: 022100d4410e902528efa87687df756125cfbdbaccaa83e579ae9766cd3436becb54ab01842ed618bfb787039fb3fec06826abcbaab457f27b9619ece596eb79bc4edb5e

6 output(s) for total of 14.820264770000 xmr

stealth address amount amount idx tag
00: 31d5f59b43302e023080f48e5739690f70692beaac29504b9040851ef8dc45c2 0.001264770000 0 of 1 -
01: 64c752ffba0450a860e7b806493e8dbb693138fbf41beaa67f6b8c2ab3e20a4a 0.009000000000 160992 of 233398 -
02: 6cfe84982ec719ae53ac69da1b0a875537afcefb417dbd26b3b1e924432ad6a2 0.010000000000 330624 of 502466 -
03: 040f1a59dfc78639173270fb3d57606574fb4c14b182b21601e143975cdff5f7 0.800000000000 110021 of 489955 -
04: 9d191742828d895f33beedf65d5ca2ba30b4364b0ef516e564fdf26fdd1bbc66 5.000000000000 102838 of 255089 -
05: b1d495905c84c51513d49fe2c7bd8bbb7aa3d247371d4f8a2929da609fb155f4 9.000000000000 15594 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 14.826000000000 xmr

key image 00: 1317db7dfeceb7fced123bfd00f4bf996caaa12f8d20660f0ed3f676061dc39c amount: 4.000000000000
ring members blk
- 00: e713caabe6e80d42099a4f81d85181e4d7d31f942be05fd33b06ee1f8639d8de 00077096
- 01: ad8646df342b508de60d0e68d4ef75cee40097056fdc64ccd2fe230d8335e3ef 00170529
key image 01: 178c3ce57d35885d7587f46b776cf04cc2c6cd95dff1dad4a30e0b1dbc373528 amount: 0.200000000000
ring members blk
- 00: 39ff2724fa5d7ab0df9494854d64b3ea3bb5d1afdd113407e1ac99fcf6a43bb5 00118561
- 01: 2ac897b141271930444eb16878302e9deb81042ef59a98732bb33e1ed918fdc5 00170620
key image 02: 79a60695147779c706f674c3f31da5741093eeeac1425fd0069339af8a37ce65 amount: 0.600000000000
ring members blk
- 00: 71190885f2f895fc4e6405835124bbb63015691392a30001dca115e891ec6ebe 00077060
- 01: 38586b4c7ea21b0a011c8cd07390c68c7170ae2ba2a30b0878b4755f2092ec4e 00170539
key image 03: b09acee3c44a8dd657605a7fe4344f2256fca82f1b6022fdebfb4a572293fc07 amount: 0.020000000000
ring members blk
- 00: 0b89645e679822e5d31430d77f74c25e47f1c7f4350da39585dc1f86ef69bff1 00050892
- 01: c2cfa99b401eb5a9e184f87d563c169d73c249d7ded289d557faeebd1455c192 00170619
key image 04: e3bdce68ce13fcbb534b45d97dc20b2f279394fdc73a538e53aba1a25038b84a amount: 0.006000000000
ring members blk
- 00: 353a73260cc022eec6979a440733d6d49f0e29f9224e834f93c7c1e5211b1bdd 00075489
- 01: 4f29d48204172bc31688ca6896acefd4d248398ad23f27033971a695a6b9e1e1 00170222
key image 05: 5405d4ce25acb5ce8a5ceb595ee81972d90b6b3b02c8aa9436f3acee912006cb amount: 10.000000000000
ring members blk
- 00: bf1534ccd126badc40e4fd6417b0d76de1f40b828c578c7f7f60c8e5c2db09bf 00048546
- 01: b9791d7a64e5d23867b3452a518bc68c3747ddb158c07205db9ef6af68336b9a 00170529
More details
source code | moneroexplorer