Monero Transaction b9aaf2a37ff4f6c6f929ff8d6ba7138f5055efca41c523e9cb419666bd162cdd

Autorefresh is ON (10 s)

Tx hash: b9aaf2a37ff4f6c6f929ff8d6ba7138f5055efca41c523e9cb419666bd162cdd

Tx public key: 3772f93784084bb674118b60a2d2a666f9c60a60628f809b69a83cce9380ba6a
Payment id (encrypted): aa85efd3608e7c97

Transaction b9aaf2a37ff4f6c6f929ff8d6ba7138f5055efca41c523e9cb419666bd162cdd was carried out on the Monero network on 2020-01-14 13:56:40. The transaction has 1295147 confirmations. Total output fee is 0.000034620000 XMR.

Timestamp: 1579010200 Timestamp [UTC]: 2020-01-14 13:56:40 Age [y:d:h:m:s]: 04:340:18:53:13
Block: 2011097 Fee (per_kB): 0.000034620000 (0.000013634954) Tx size: 2.5391 kB
Tx version: 2 No of confirmations: 1295147 RingCT/type: yes/4
Extra: 013772f93784084bb674118b60a2d2a666f9c60a60628f809b69a83cce9380ba6a020901aa85efd3608e7c97

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: f6cd6ce6386eb830d57482ebb77d2a4e29ee0fd5cbf8eec2225ab83c560ceb17 ? 14310277 of 121896318 -
01: a18fa0414f3841fcb76ed0866dbd2ab63f77349c87b9a30d40ed240c4fca4059 ? 14310278 of 121896318 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: ec61b464aa8542da96825e4a219a23f72b46eb5be8aafd677b9eea0bb9a53c0c amount: ?
ring members blk
- 00: 91cf5aa815c60cd5e6fdbb4fb73931dae610a4f5c45fc0d81d70f58a7782844b 01998079
- 01: 2c2c4bf0a311729899f11e108b9ee5cbd238fe0692bb4a5be1a1d94e02ea3d85 02000956
- 02: b72a143beebfb3933462e1c10f6d3322e6ae25fcb993a72f35a103b15b594911 02001471
- 03: 9b3fd364ccdf11314a6853232fc4eb34d40af306423497942e7ae222ebe2ce03 02002383
- 04: 5709bb8ff1dd8714ac89b8fb5e7277a5e0a511e238c708859a9ca50062c0939e 02008156
- 05: a2fa568ef195bb43be5a90abcf2b52289cf3f2d8548da83b85a55848546d3de8 02010358
- 06: f1e99e769697aa3ea4066f706b3bf7380c773f38ded5b9df085c4c8de723cc46 02011045
- 07: 2400ccc9683b70047cf547f03c237d5440c905c21dadf829f14d0a0e5a8fef08 02011061
- 08: 1aa5cc093795e4d808a13c62a4dfe23c4bfd50fb25474f94d3cac7f46d15c7f2 02011078
- 09: 2d54d7b3a8b1c0783b0f3fff17358df64e611617db3a0b07c65b438d07eb9319 02011083
- 10: 517f16ef0352af82baa6bb5b72e1fd997ac58a96dbc8bf77c054de957c05ebd5 02011083
key image 01: 60f6544256dafef617e77ca443f9d10ed84fcb29d18a9e08fc693fc818a2772b amount: ?
ring members blk
- 00: b34fe3b352dbef889adcd95fa2ab5b71d069534eaf3a0f3bbba0e026b42c0899 01990691
- 01: 6c4add832e17e4d343d9577c6599257cd457946bc32f8f69b1282862d2ef943c 02010519
- 02: 8c03fd4cb33d6c853d267f68e8511be210ed01470ad3c3d7323f4e1c02555c01 02010660
- 03: 3f4210e61f65be1d7284f578ea523a8f363ed846bfa14a92d50a9433dd8a87f3 02010742
- 04: 6b7345d0366a8f976907d9fddabadcfaae0083a4c6b137996d49592a19eb109e 02010939
- 05: d664da4abf75a25a429b5e22e4f560f2aa4c18bef9c2844cb7c709898b9a38de 02010955
- 06: 651c1efdf736e96472e5074f9045d411aa1653e84426b350a53f2c97ca0af774 02010989
- 07: 5508b0c7ed325ffeb5f28c7d229c3389f47646d79ad9e928f8e0db50e1edd651 02011003
- 08: 8c664af0605a175164975b99f71c17a1414e231326dd4261ebd686c8d7df6aab 02011061
- 09: eb5c5b7b32d1e83da15c5e94638f903099a18aed8b65e00ff0fbaac360846132 02011073
- 10: 833aeaa4b3eb6869a00de8723e3fba6a46afdedebc57e1a102be8c4a2cadf833 02011083
More details
source code | moneroexplorer