Monero Transaction b4cd12efb0506ad016fbdf4eebc0608a3a6b95dcf6288747a57739ab63da7d5d

Autorefresh is OFF

Tx hash: b4cd12efb0506ad016fbdf4eebc0608a3a6b95dcf6288747a57739ab63da7d5d

Tx public key: 70247eb9ceae86881193129caa4b4fd77fccafac37f2da8ea88236cb4b28670f
Payment id: 2266c509cff9732cb5d68c10ee6efec2039d8a7496e1a1d56bcf7ef6d55c41f5

Transaction b4cd12efb0506ad016fbdf4eebc0608a3a6b95dcf6288747a57739ab63da7d5d was carried out on the Monero network on 2016-03-02 21:47:51. The transaction has 2320281 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1456955271 Timestamp [UTC]: 2016-03-02 21:47:51 Age [y:d:h:m:s]: 08:285:18:23:40
Block: 980420 Fee (per_kB): 0.100000000000 (0.185171790235) Tx size: 0.5400 kB
Tx version: 1 No of confirmations: 2320281 RingCT/type: no
Extra: 0170247eb9ceae86881193129caa4b4fd77fccafac37f2da8ea88236cb4b28670f0221002266c509cff9732cb5d68c10ee6efec2039d8a7496e1a1d56bcf7ef6d55c41f5

7 output(s) for total of 1.900692718600 xmr

stealth address amount amount idx tag
00: 3f5e9d1841f48a3871c8231f24afd819c6b92b913e99f738427935bd822ef42f 0.000692279885 0 of 1 -
01: 89f9e65e5ed4c93a4b78af38f57b3ab9377cd7251c582c4b600bca14e7202cb9 0.006000000000 205055 of 256624 -
02: 3db53ba6937022eba9345c0ab5314ba2df0227b34f68266d2a283b2ec950db0c 0.020000000000 308870 of 381492 -
03: cb85f0d335349ce8117e5b96a4755ce8ba4a6f6eacbba74c18e1d64e811a0f18 0.004000438715 0 of 1 -
04: 02219c448c3d3627a33af8817af1e4a3a62c06ebc178ec0452f78d1e3e027e55 0.070000000000 189171 of 263947 -
05: 1c09c64b072d25dec861a8bc7a01c0fc1e61dcf9ead5592cbac3bb60503f6f5c 0.800000000000 384331 of 489955 -
06: bc553898985128e0da7287b4d09fec4a872b61ef65bc30d121353c0b9db76b67 1.000000000000 686650 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 2.000692718600 xmr

key image 00: 500355dbd12c644eb50f334c744cefb82a93affd5c99fd40b7a4085156af3fb4 amount: 0.000692718600
ring members blk
- 00: 64c6fcc6fa52167d976135d6d475d71a22ac032361714d381a6363fa29a3403b 00974807
key image 01: 0409d6187e71ea04ee60feac0f91834e746e86b4709a41cea200112986a579fc amount: 2.000000000000
ring members blk
- 00: 8ad35bd841fbac5e11387cd672712ff15783cb1bf8567c52d88d8f0a785ffcc7 00980072
More details
source code | moneroexplorer