Monero Transaction ba4d3e9305ba376b803648af157dbe894f409a528240e4a6847073096d558451

Autorefresh is OFF

Tx hash: ba4d3e9305ba376b803648af157dbe894f409a528240e4a6847073096d558451

Tx public key: d6e208e6b3fb9d7e33a9333f7acdca633e2ce84d3522b567b113a196fdc7f702
Payment id: 927352651d8a4b10327c60ea711ff09d902337ddf784e110f4de2b782230df28

Transaction ba4d3e9305ba376b803648af157dbe894f409a528240e4a6847073096d558451 was carried out on the Monero network on 2014-07-20 14:22:22. The transaction has 3140958 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405866142 Timestamp [UTC]: 2014-07-20 14:22:22 Age [y:d:h:m:s]: 10:115:14:39:26
Block: 137143 Fee (per_kB): 0.005000000000 (0.006117084827) Tx size: 0.8174 kB
Tx version: 1 No of confirmations: 3140958 RingCT/type: no
Extra: 022100927352651d8a4b10327c60ea711ff09d902337ddf784e110f4de2b782230df2801d6e208e6b3fb9d7e33a9333f7acdca633e2ce84d3522b567b113a196fdc7f702

6 output(s) for total of 41.937670090000 xmr

stealth address amount amount idx tag
00: 40fb4fd5fc98ae6bdd5516bf811e4990e30d2becc00f974c0dd277303ffed7fc 0.000670090000 0 of 1 -
01: 7f7bdfdda5f2ca9a882f13d2ecf1f10eb41c9084c3a2941e6f6726e3a683a2a8 0.007000000000 163335 of 247340 -
02: a3a4a6f1e8f2fe39e9ea2a15c81f6ede42406cc04dd3274b0665b8c3c6b50c9a 0.030000000000 149946 of 324336 -
03: 0c4c7f3170973a7ba1db2f0f6b167dede0722f39a6ab3c3bda8e1c460308d8c3 0.900000000000 60066 of 454894 -
04: 565102d9fb9bf67ca5ddb7f4800cfe31085b2286152f8436e21a4a3bef4138bb 1.000000000000 119025 of 874629 -
05: 9447432932d6f65f27f6e659054f808418d24e0bb3284c88e5783ed07ea1b88e 40.000000000000 2590 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 41.942670090000 xmr

key image 00: 8533f41a4a7831dec48c241444addcf9a998e79e2f826bccdca9d473bbdb2b4b amount: 0.002670090000
ring members blk
- 00: d32e86d46e54124e44a1df04bcc04358e8a2a163c96733e1e9113ad09b0ea3be 00137132
key image 01: e37b14b6642ba14ea9d11820ff538b61dbd9143170063cac8a508924c9f7b89c amount: 1.000000000000
ring members blk
- 00: 47845d136268388762f90998fea119107f8b29f41ed144a122ca0e872c730be6 00137132
key image 02: 6d5697bc2db8dcd2000240948a425ae4c122e7e58b0cc1077a6d40bcf3beddbe amount: 0.040000000000
ring members blk
- 00: 197e300570f6fdea02e19064676eb6bd9a31fc0c94aa48641b981c7b6c80e87d 00137132
key image 03: 69528bec623e4585a5f425f485a9bea8916c998de92098b96d3bae7f2df6ae85 amount: 0.900000000000
ring members blk
- 00: 28b06d9373df5a60fce5cf278eb34fbe352001dfe58211e4ba99d60134f0a7aa 00137132
key image 04: f3839e9b137048785c62568bf4134356902ed6b4b27782a4b555df7cfc9c0ccf amount: 40.000000000000
ring members blk
- 00: 0d1219c509a930c4b7f397193b91ee601e36239359e55bf939f5678e8d56790d 00137132
More details
source code | moneroexplorer