Monero Transaction b8a42c068ce957260ce4dcfce542ea9e02c93d285eba1f53a9c648f31d49f3b4

Autorefresh is OFF

Tx hash: b8a42c068ce957260ce4dcfce542ea9e02c93d285eba1f53a9c648f31d49f3b4

Tx public key: 087c535a8753a97b2be73348bc80acff577d6a0ef60b901c12ed87f51793067e
Payment id: bbb3b3dec73a9892b2eeae30b09dcd3effb496bf99502fae33ed42a9c7efdb61

Transaction b8a42c068ce957260ce4dcfce542ea9e02c93d285eba1f53a9c648f31d49f3b4 was carried out on the Monero network on 2014-09-25 18:03:37. The transaction has 3060294 confirmations. Total output fee is 0.162689410000 XMR.

Timestamp: 1411668217 Timestamp [UTC]: 2014-09-25 18:03:37 Age [y:d:h:m:s]: 10:070:06:31:41
Block: 233501 Fee (per_kB): 0.162689410000 (0.196687078914) Tx size: 0.8271 kB
Tx version: 1 No of confirmations: 3060294 RingCT/type: no
Extra: 022100bbb3b3dec73a9892b2eeae30b09dcd3effb496bf99502fae33ed42a9c7efdb6101087c535a8753a97b2be73348bc80acff577d6a0ef60b901c12ed87f51793067e

6 output(s) for total of 21.937310590000 xmr

stealth address amount amount idx tag
00: 47d4f119b578a021362567aa579cd9a02f9fa9306618c78c20daca1a0d5403f2 0.037310590000 0 of 1 -
01: 5f161278d6b1067fe4c963f61fc18335a8b15774337ae1307a047bf5475f9a86 0.200000000000 524231 of 1272210 -
02: d9c23e92432ad2811abed8dfede13d9872016ffabaab209ee02a1d5a9db45711 0.700000000000 158641 of 514467 -
03: ef3ce743d1ca0287bf6e14f451ed7b9124aead6330c068faa1742e02f1d95a67 5.000000000000 115442 of 255089 -
04: 9e69c3e227d2e8f5243b579f77cd5efbae8fc18a635a079d615ca92c07d1bb7d 6.000000000000 82777 of 207703 -
05: e387b17b8e4614a063b9a492d2e1a6da9dca6b54a4e440f453aba76964abb651 10.000000000000 271739 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 22.100000000000 xmr

key image 00: 43ba4a5ef98d90354970d4d38c338e6f8392e686c702e2ff612a89b06b096052 amount: 0.100000000000
ring members blk
- 00: 31c82aa50f35205083c694df4a7e79f8382cc8b6e391ea3fd3ecf36ab44d4dd8 00231523
key image 01: c703a1472ae1f035984366a931b997713ddfaaf66258a3c71129d8bbfad05a76 amount: 4.000000000000
ring members blk
- 00: fc0d3cfd1d344ce0cc1eea8bca33e05c68e2104dd394621674a1864c1845bdd5 00233316
key image 02: d0cf0e5531b0a737073d5be5276b3967ea75e26fa94e0ce0bd90d6a754b77639 amount: 4.000000000000
ring members blk
- 00: af3db95a4be2266b3d42ba1d5369cf894fc9886219c0979b883bad2f06247705 00231333
key image 03: 90422faa2e1b5f4eddd42871e0204bce35e45ae802e2ef925372019bec839fa9 amount: 6.000000000000
ring members blk
- 00: fc50f830c729aab94df4393a3d910ed91fcad101861bdcd0e1728bf6b11892ad 00233275
key image 04: a32e709ed6b93a76707859f55b8386cfe155d263e67d404411b428d322aae22d amount: 8.000000000000
ring members blk
- 00: bdb10bc9bf6eb42e0688241b114715fe00db2e0de14ce9137e616b284c7cb973 00233465
More details
source code | moneroexplorer