Monero Transaction edf6b19be576c5bdfbe3b249d47ba3516d8f806fe77977460dcc1c554141c9b4

Autorefresh is OFF

Tx hash: edf6b19be576c5bdfbe3b249d47ba3516d8f806fe77977460dcc1c554141c9b4

Tx public key: a64b2ffd8dfaa2924b57524d846365a19365a5e3c8d43f5e61b58c3f03fe86d3
Payment id: fa4513baa20370eb2e2f0194488c3b51e169775d02f7ec2b90d3d4220296609b

Transaction edf6b19be576c5bdfbe3b249d47ba3516d8f806fe77977460dcc1c554141c9b4 was carried out on the Monero network on 2015-05-04 20:36:39. The transaction has 2753189 confirmations. Total output fee is 0.147064217493 XMR.

Timestamp: 1430771799 Timestamp [UTC]: 2015-05-04 20:36:39 Age [y:d:h:m:s]: 09:226:15:45:45
Block: 549520 Fee (per_kB): 0.147064217493 (0.158353058583) Tx size: 0.9287 kB
Tx version: 1 No of confirmations: 2753189 RingCT/type: no
Extra: 022100fa4513baa20370eb2e2f0194488c3b51e169775d02f7ec2b90d3d4220296609b01a64b2ffd8dfaa2924b57524d846365a19365a5e3c8d43f5e61b58c3f03fe86d3

6 output(s) for total of 13.652935782507 xmr

stealth address amount amount idx tag
00: 9bfaec6ed743a7fc74ec80d96145dd0f737d459b59079f89598ffb92f020da57 0.052935782507 0 of 1 -
01: f6a6eef0075b97fd19cf46eb51e1e64f2079783bb14a883e18ad6e95b76e5b05 0.700000000000 307389 of 514467 -
02: ac345cb9e16e0e50077f246123d6100f554f8694c19565f2de3f1f2cb679670e 0.900000000000 240528 of 454894 -
03: ef485b526ff69fa242dab6866b11eb01d3453d7f6b221d582bb59a40ccd1404d 1.000000000000 552381 of 874630 -
04: 78d86c9d76de964f66778be6934632c4cc5d7fa0431c6a69ec91bc2e7f6d316f 1.000000000000 552382 of 874630 -
05: 63f240fcacbbea82ff5a39b91c99711a71d9a158484cd7c7d1fcdef9a9329ca8 10.000000000000 628724 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 13.800000000000 xmr

key image 00: c1042025c98e945b0352cd4784ac52a57a4ef713232ed21a886d587f306c999b amount: 0.800000000000
ring members blk
- 00: a021a06b4613e29d3ff85d60b62ba6f31b6a9870ebd3f2d10351192e9eca23ce 00549315
key image 01: dbe46ff9f49cb9a674fb44397d19c0e27ca1008384fe2c76dc382926fef6d297 amount: 0.800000000000
ring members blk
- 00: 45a6e5831450f7744f4a7bb28ae0f6cb2f7334a9fc4ff5ac566a55fd092d66a3 00548708
key image 02: e330f2e02921347f6dce0433f0d64a1ec8cede91b31de6cbe99abef7eef94e79 amount: 0.600000000000
ring members blk
- 00: e5593ab38ec43c9ed9370073416924ddd813c9204ee9cbcff901efa8449dfea7 00549243
key image 03: a0a4c7ab04693d14ffe3ddb58277ea95019d5e419f68ff91809cebc753a9c1fc amount: 0.600000000000
ring members blk
- 00: 5b29e8ae8252694050c44a9f98be6ab4ace2176bd10c489674c785fe3f8cbdfe 00549218
key image 04: 9ad3c6a32fb96f3d213af67113f31a0c31a27323fe135157a32c94fc20b351f1 amount: 7.000000000000
ring members blk
- 00: 6769c5b99a323f29bef74b97e1d358702d5d073fde7137d870b44cea4ecbbc55 00549233
key image 05: 9b4228ac3239b862bb0c0fd64713829a53cd6910a3f311b93b33aa3ee00c56da amount: 4.000000000000
ring members blk
- 00: a18aedaa1c4f9ed7027619faa45a5c3de847c6b20399809169ad805d10330c7a 00549383
More details
source code | moneroexplorer