Monero Transaction d4420129bca2a6eb38f720d2023454c0959813a804eaf7cac21e075698662e9f

Autorefresh is OFF

Tx hash: d4420129bca2a6eb38f720d2023454c0959813a804eaf7cac21e075698662e9f

Tx public key: fc636386ecd28b119133eac64809932d7f0d4b335d6f9b54fd90e33d6d203995
Payment id: 694c4b93a2f2cbcc270f10ad0f1cf836a7581f8d797f29d7bbee0a53b761ec85

Transaction d4420129bca2a6eb38f720d2023454c0959813a804eaf7cac21e075698662e9f was carried out on the Monero network on 2014-10-17 21:06:51. The transaction has 3030584 confirmations. Total output fee is 0.146599022629 XMR.

Timestamp: 1413580011 Timestamp [UTC]: 2014-10-17 21:06:51 Age [y:d:h:m:s]: 10:050:20:10:48
Block: 265192 Fee (per_kB): 0.146599022629 (0.142156628004) Tx size: 1.0312 kB
Tx version: 1 No of confirmations: 3030584 RingCT/type: no
Extra: 022100694c4b93a2f2cbcc270f10ad0f1cf836a7581f8d797f29d7bbee0a53b761ec8501fc636386ecd28b119133eac64809932d7f0d4b335d6f9b54fd90e33d6d203995

6 output(s) for total of 19.812854760000 xmr

stealth address amount amount idx tag
00: 61e1af06b1df4c0fdd3108d93cfd6f012834304686ef1291743b76f8fa8a5baa 0.012854760000 0 of 1 -
01: ceda1d2b785e13b4fadbfd3bd117ad430e40913c52d0707f5ef3d8f48a61064a 0.300000000000 287384 of 976536 -
02: 26d763bf0141153dfb904f733d783eb81729b957a882cca2efd662dcce5a64e5 0.500000000000 386437 of 1118624 -
03: 40b407afe2e83c5bc265f78c3596f025fbb5155049cf77b7bff47d795c6a3932 2.000000000000 117671 of 434057 -
04: 1d7c77286d6ab1c83cc98866701949470cee924e52bd59dabf6b79754b6efc1d 7.000000000000 58026 of 285521 -
05: 894ff09b632b83231b3889f5ba2d1047e43319b57815ef408962357878886c9e 10.000000000000 308865 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 19.959453782629 xmr

key image 00: e25f3740bdda039e5703cade28ba18c48fa6561cbd60379e7f28f69cca192191 amount: 0.059453782629
ring members blk
- 00: c8222edb59e63c93cfcb27dea4ba8f9ee540af737afb1348703e1577a3327898 00260179
key image 01: dab27040c2ff436cbaa8c525dc3cbc626c1e177397d00a7916179c5a9ab2fc6a amount: 3.000000000000
ring members blk
- 00: 049a27d2b03ad749e8c13180c481b7a74da02a36ff3f12ff0e4c7297cd7ae597 00264702
key image 02: 99b78b42f72ae5ca702a9678eba9e1e7f365b8b4d218eb47235b17e7351cbe2b amount: 10.000000000000
ring members blk
- 00: 06df1f3b6f92187a84151645c07a54aecb66f7bf720b686a53f1680adcb0ed0c 00264236
key image 03: 22e51ed1b658a8ce109263fc95bfaad90a3d7ce60617ebe92a27ecdcd8291b22 amount: 0.300000000000
ring members blk
- 00: 55d8c81ebcf1622c9e55d0e26e10cea776caf298819e26575d1193d08322d858 00265144
key image 04: 3d0247c485dbb0c768c642afab86a4c0a46fb46db5d2ae5a0d393d851696d62f amount: 0.600000000000
ring members blk
- 00: d958e9b850cebab8f25dd5d6a1487a5c5860296cafebb34643461d62dd5ebef9 00265028
key image 05: 79ff34d326a2b67740d4edca692b8cf89c7ad927378384f5d9e73ef15f9850dd amount: 3.000000000000
ring members blk
- 00: 9bbb12744a108d0175f7b73bd728c6f97f3dc74346b4a60491abdf4c1a01f242 00264949
key image 06: dfa12a27925cc3593b4758aa6e9e4ea8fd9fc5abe502001825ceea4b29b12cde amount: 3.000000000000
ring members blk
- 00: 966f2b7a394574991dee50b02c43571101e8b2a19af660b6fa4f9e5baac30346 00264524
More details
source code | moneroexplorer