Monero Transaction b48045109e5a595fd08cd94267c47ace13041ea42275fadcb4bb7d4b7f69891f

Autorefresh is ON (10 s)

Tx hash: b48045109e5a595fd08cd94267c47ace13041ea42275fadcb4bb7d4b7f69891f

Tx public key: ad12666856086f95eab1d274647fa2b24c6b64edeffd92f8c71f91994ffa1bf8
Payment id: 1448f8d3b574fe4016e0136b2072c7217341524c8702de47da4199da603914c4

Transaction b48045109e5a595fd08cd94267c47ace13041ea42275fadcb4bb7d4b7f69891f was carried out on the Monero network on 2014-07-23 17:30:20. The transaction has 3136620 confirmations. Total output fee is 0.005750210000 XMR.

Timestamp: 1406136620 Timestamp [UTC]: 2014-07-23 17:30:20 Age [y:d:h:m:s]: 10:112:18:06:11
Block: 141681 Fee (per_kB): 0.005750210000 (0.004706806587) Tx size: 1.2217 kB
Tx version: 1 No of confirmations: 3136620 RingCT/type: no
Extra: 0221001448f8d3b574fe4016e0136b2072c7217341524c8702de47da4199da603914c401ad12666856086f95eab1d274647fa2b24c6b64edeffd92f8c71f91994ffa1bf8

8 output(s) for total of 5.130249790000 xmr

stealth address amount amount idx tag
00: dfd8f7d580c38bd54fc79dea6f83b138a78e874facc532360cf417fdacc02ed6 0.004249790000 0 of 2 -
01: 1accdfae8b8cecd5f07061416fa8fec1079ac9cd29c46bb8786703b6951d2737 0.006000000000 173256 of 256624 -
02: 3a501266b8caa1b226b9e5012f126f200f8d746bec83e597a273a7eb7b7767a9 0.050000000000 108355 of 284521 -
03: fd0a8ae4e14138bdc473b5f91dafa5bbc368301f3952871b83b32f6797e0570b 0.070000000000 86148 of 263947 -
04: 783052ab8e59a760fbcc52dd54adf6206d8c4b7e716f02a1a5d276e237940c9b 0.100000000000 312132 of 982315 -
05: f9ae04ccf73130cac16d32ed99f40a0cf1a63007408b4ac790ea1ee8f90166fe 0.900000000000 63368 of 454894 -
06: c46c3948d69e0e9cf21bc7e14495c5d9e276ca3798dbced1d9392704de2c7c15 2.000000000000 51457 of 434057 -
07: f9cd35a25664c8905193b0e1fac9bb8f9e939989734b318c6e0e6a56ee5277a3 2.000000000000 51458 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 5.136000000000 xmr

key image 00: 029c88ec15cf93101e94666e458c5c61fcef0d7ec7bc7203f23d3936dc844cd2 amount: 0.070000000000
ring members blk
- 00: b3d1dd5a8811c1c5dccfd90f111c7d58f8b506bb02ee09c53585ae722481e9eb 00068862
- 01: 3d883dc8fb591a97dc996f3f6f1eea4e8bcc3766fae6e36ec10c6e4e0c5b138f 00141619
key image 01: b308abbf06e4db0ead019fe9a52147568df8773bc785d7c250db601db36395e3 amount: 0.010000000000
ring members blk
- 00: d385d6df4cc48482ec777273988329f20f00217c566dca7292d3a57b20d223ad 00081508
- 01: e144a9359baf55a06022195e0d02054c7be46e6540be449285136acd4a69ec34 00141669
key image 02: 2f2f63b987706db625320722a96c6ac899f5da3c45dc2f6ebd25d4d1c179af67 amount: 0.050000000000
ring members blk
- 00: 10f1a94989e556e172caabcee07d81993c3c999a1963635fce2d4543abb47c5f 00077709
- 01: 4c4eeb7ffb50c3710b82072b033213f6c92f261833763db8318e728ba7bc3bb2 00141669
key image 03: d0c4ae381c21df3bd627d9ef1d9a3dba817bf01d8d03ff418617eb4adf35339e amount: 0.006000000000
ring members blk
- 00: 6a74c8fa783c2ff27de79603380ac4101d828e91fc0354fcfa9f1435a837db2a 00057489
- 01: 435b20c7c988e5887a07f30a5105eb49d16e0f826ecb223200c600a1b045159f 00141656
key image 04: c50f1d65eb7ce3642618b3940d84918ca77e8d5a0f1712d41570bec59bbf6e57 amount: 5.000000000000
ring members blk
- 00: 8e7c716547fef6d67007d9330ce1029280a91142cfd9f1ba68e971ddb36ff54e 00067718
- 01: cc5f5534a3444252ff81516b9dc16efc647f56b81389e4a8b16d04e9a6342bc7 00141594
More details
source code | moneroexplorer