Monero Transaction cf04cf3cc6af3e50678cfc1ebffad62e2b88dd7aa3bc9ba790cf73cd75e23840

Autorefresh is OFF

Tx hash: cf04cf3cc6af3e50678cfc1ebffad62e2b88dd7aa3bc9ba790cf73cd75e23840

Tx public key: 31b845aed08a7c5dc7caea9fe687de61e80fe9d6dc9169d4c5d90aa68af9cc80
Payment id: 4749e8fb9bc84fc18c7bfc031f1ccb5205799fc107244280919cc33092335bdb

Transaction cf04cf3cc6af3e50678cfc1ebffad62e2b88dd7aa3bc9ba790cf73cd75e23840 was carried out on the Monero network on 2014-10-16 20:00:35. The transaction has 3109102 confirmations. Total output fee is 0.109830560000 XMR.

Timestamp: 1413489635 Timestamp [UTC]: 2014-10-16 20:00:35 Age [y:d:h:m:s]: 10:158:22:43:53
Block: 263702 Fee (per_kB): 0.109830560000 (0.106100465509) Tx size: 1.0352 kB
Tx version: 1 No of confirmations: 3109102 RingCT/type: no
Extra: 0221004749e8fb9bc84fc18c7bfc031f1ccb5205799fc107244280919cc33092335bdb0131b845aed08a7c5dc7caea9fe687de61e80fe9d6dc9169d4c5d90aa68af9cc80

6 output(s) for total of 27.295169440000 xmr

stealth address amount amount idx tag
00: 2eccc73b6185b3a116542e519798fc0afc91c3aaecba684e48096f9de2d20cc7 0.095169440000 0 of 1 -
01: 7b4091855d63d2f110cd22c15e3be69301f85b569948b1e699b1dcbd9a49937b 0.600000000000 238901 of 650760 -
02: 60d11c8c7638454f2eca6e2d1a07160eaf1f4c359862a4e539c2f8ac25ad4b97 0.600000000000 238902 of 650760 -
03: a5983676dbd866a2edaab2905a528e8f209b5acb6e41b272aff24e36764e051d 7.000000000000 57918 of 285521 -
04: 92ceff8c64e04fdf89a715fb7035fd10e59e2fe60b005bde1e5626c32685e870 9.000000000000 23610 of 274259 -
05: e4d5e3695cecbfd7b500e3fa3e25b25537376363b71aaca4261278ec5e40b77e 10.000000000000 307097 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 27.405000000000 xmr

key image 00: 5ba75572644f20d0d5923cb615df8ea19e18de742a4691ddb5dae1141701a691 amount: 0.005000000000
ring members blk
- 00: ed279e0adf174c4188eb886921355acd3fed02145165cac3c4bf5b135b863416 00175649
key image 01: f09f8cad571ba9954e466d8d8ec444003e11cceb6446658f2ce28ff64e409131 amount: 10.000000000000
ring members blk
- 00: 6073ec575796931b5e9c3ac46e38e52ae8704504acac46438ad74b596922aaf8 00263503
key image 02: eb39e1651a6482115f4cad84e4456a4fd72ea7b89d8ae92c534cf2a9b1e115fc amount: 3.000000000000
ring members blk
- 00: 688bf4f48acec8d34915e4297c2720cf8429d2b0cd19751635112c3bc5414b91 00263158
key image 03: 6e655040a0be8929fdb147cb01fcc143c51861ba600250160e9136b4a8d6984f amount: 0.700000000000
ring members blk
- 00: 9f9094236ddc12b946b9c00a7b32ced7bf75aadf7e2ef17f7026723742b5e8bb 00263562
key image 04: 2ef8413ffca1e3d22a67ab288e9e39f51371fd098e9bbfbde3bd26b98c62b54f amount: 0.700000000000
ring members blk
- 00: a31e81cdc7e4f5f95a1caeb3c7082d781e677e1a0ac61b3ad3c6fa18686e43e7 00262819
key image 05: 558835872d84d3fabe81e1440168b2eb61ab2273480180f454bd9509e3ff63b2 amount: 3.000000000000
ring members blk
- 00: 6929d33e8855a5d3c68a2ff54959745f83362cf4e2cc5d268e90e148656e9a8a 00261351
key image 06: e7c9a4e13687d0c204cff3e429b5cad6e0dfb47e0300914f380e72d1ad7decb2 amount: 10.000000000000
ring members blk
- 00: 4043feb6d1d729f7eb4c9c7ed2f30c086e6a514b103273e5324f0f3c7f2e5365 00263158
More details
source code | moneroexplorer