Monero Transaction ef73b2f0f4af125ae6e7a4909b6c9bf6f6cc205528b12c7647e2ae00666bff65

Autorefresh is OFF

Tx hash: ef73b2f0f4af125ae6e7a4909b6c9bf6f6cc205528b12c7647e2ae00666bff65

Tx public key: 2a4c545289ba0e71c245b7c898bf989f4e4e864903924ebc1f74f59ac23699db
Payment id: 9a58a56dc21211f7f933a89573ef3f0b933ffc54a30e223d22ea15e4556cd712

Transaction ef73b2f0f4af125ae6e7a4909b6c9bf6f6cc205528b12c7647e2ae00666bff65 was carried out on the Monero network on 2014-08-05 05:30:47. The transaction has 3133794 confirmations. Total output fee is 0.005819450000 XMR.

Timestamp: 1407216647 Timestamp [UTC]: 2014-08-05 05:30:47 Age [y:d:h:m:s]: 10:121:05:00:16
Block: 159614 Fee (per_kB): 0.005819450000 (0.004774933333) Tx size: 1.2188 kB
Tx version: 1 No of confirmations: 3133794 RingCT/type: no
Extra: 0221009a58a56dc21211f7f933a89573ef3f0b933ffc54a30e223d22ea15e4556cd712012a4c545289ba0e71c245b7c898bf989f4e4e864903924ebc1f74f59ac23699db

8 output(s) for total of 2.943180550000 xmr

stealth address amount amount idx tag
00: bebf1f2f2f5a0c0f00931444d39ffcf438dc2003c7dfd442bc5ece5aa71f04db 0.000180550000 0 of 2 -
01: ef91d3ef031c023a49ee6f96432ac870b7001ef70b63dba3cc9e2238454e7d19 0.005000000000 202876 of 308585 -
02: 32509e346cde5af373fc68ce671c46e398ad20f8f3dfd76caecc2a831cefb2f4 0.008000000000 162876 of 245068 -
03: 8e256888704995bc0237fef1e99bfad31cbd1141ce41cdadd3a4055c054c5100 0.050000000000 114373 of 284521 -
04: 8324e014aa7dd2c3bdaf1cdd32de1d156ea297a6ffb9d055b6eeb84bdfae462c 0.080000000000 87563 of 269576 -
05: 0268453a46102b103b766945f5db68478d21fe151bff78bd3a253e0c14cfa636 0.100000000000 373919 of 982315 -
06: adb75e39b43f0418996bdb3952b8feba89ce541bc5cfeca282008e62fc332bce 0.700000000000 96157 of 514467 -
07: 3c37b5fc0358d00a06a1362856a171430d20981e16e524dc1e938483f02b7332 2.000000000000 65107 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 2.949000000000 xmr

key image 00: 61786cc930b60318320c9c2ccd7489f062b17e5a1b31c4b8ab4b03cf38a3ccde amount: 0.009000000000
ring members blk
- 00: 792c45e3509ace409ef188ba81a228bd6975aa2c98c0777809576fd0cfed366a 00057359
- 01: bd6339dbf8af00321b8486f09e32e189a6cc68cb61dd587ff4ad8e84a4dd8d94 00159479
key image 01: 2b31b51169fb81aa66d8c5c2a40d68c5a6a354581f7fe3a033f4f29bfe043c26 amount: 0.040000000000
ring members blk
- 00: b072c6cdcf75c360bd2d84d2f76e87a747ea55f6d98d9e7bd2ec41cebcab3ff5 00065422
- 01: 12b348c4d6aa18264eb4ecbffdfc5d48bc7414d150bd7206bbc3e69e474fa7d9 00159528
key image 02: b2b5ee10990b54539bc780736384b34bdc8ac21775fd1fafae1fd5451405bdb6 amount: 0.900000000000
ring members blk
- 00: 8c7670f9fd39afa9dc7a9bf79bf87691d38a377103b7c44a49ec9c97d5540fa0 00125048
- 01: 40c873e17ac6cd83921400a0ab6b1854d12fe5f139f3041e72fbb2154473b85f 00159552
key image 03: d2d2ffacdc855478345acd016fc2c6660b5b8ec2d83dc29d1ee28a55f14d0a2e amount: 1.000000000000
ring members blk
- 00: fce94db9b273de139271c1d066dc540ba5f2918eb04f1a52b602a85e3fa64763 00074945
- 01: b386bbc97db5d3ce155745d6c5b412346d992c79b27992cbd6fb07e0c6c590fc 00159465
key image 04: 138b804447d45f587c29ea853d0369150e43805c9e2e05f7b1349294bde12549 amount: 1.000000000000
ring members blk
- 00: 99f5328edb1977fec0e1bab908256ae5bf15a60ae72c7c47542ec96f618fd48b 00121779
- 01: d54b9461b49c52504eca5c15368b1951b335df41c92c8ee08fdae24a836fb4df 00159603
More details
source code | moneroexplorer