Monero Transaction f20225338b916a32634352fb4ea72c9de1766910ca329898c2888be0633043f2

Autorefresh is OFF

Tx hash: f20225338b916a32634352fb4ea72c9de1766910ca329898c2888be0633043f2

Tx public key: 71468a0fe25a2a9a57dbd9e2ab5b67cc059e7fe6593f4919c4a6553baaff916e
Payment id: 44ab5d858a392618c2b0d7fea033aa2fbe9baef48a462918322c90f22ef0b50d

Transaction f20225338b916a32634352fb4ea72c9de1766910ca329898c2888be0633043f2 was carried out on the Monero network on 2014-07-29 22:12:23. The transaction has 3144011 confirmations. Total output fee is 0.009928820000 XMR.

Timestamp: 1406671943 Timestamp [UTC]: 2014-07-29 22:12:23 Age [y:d:h:m:s]: 10:129:03:40:25
Block: 150585 Fee (per_kB): 0.009928820000 (0.015617683072) Tx size: 0.6357 kB
Tx version: 1 No of confirmations: 3144011 RingCT/type: no
Extra: 02210044ab5d858a392618c2b0d7fea033aa2fbe9baef48a462918322c90f22ef0b50d0171468a0fe25a2a9a57dbd9e2ab5b67cc059e7fe6593f4919c4a6553baaff916e

6 output(s) for total of 1.790071180000 xmr

stealth address amount amount idx tag
00: d43063e73fe59ce2af694eb3095d0a4bf97a7fae700c0be1c8d00e9943f2ccd8 0.000071180000 0 of 2 -
01: 31edf0a55054a54919cdd493d867528da2482378695fdbdbce56e92133890474 0.030000000000 154332 of 324336 -
02: 51363adb66fc55e7258aadae11d78e7bcc7bea1a80bf657eac3bbcb547c0c4e9 0.060000000000 97533 of 264760 -
03: 886da6e796d6c567bbc5544cf2071c58af30a289d78b5a5f17f84893efc501b6 0.100000000000 337161 of 982315 -
04: 24b200cff2624ae76aa310789c6d0792715b01497fb401887961e30ce2297841 0.600000000000 117633 of 650760 -
05: 1a96f0384ad00c8ba02a752212602e7e737a524960dc62ed4497bec1b8a5b312 1.000000000000 148015 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 1.800000000000 xmr

key image 00: 1d268d38cf9d3a4de951258dedbd2db77ce0a9824a7e7d84ec03a3da48afc59e amount: 0.900000000000
ring members blk
- 00: 57b34257a6204432b6586ac37d40d03b6b14649ed2147a2a3c4ff48bafad4f76 00037864
- 01: 4476e884d5b3c887f121baea548621d9444c4facc974d7bddae0241668cbd8de 00150527
key image 01: ad50ebb1a1f165ef8821268aaecd5d962022037ec97c53d648e31084e9a2f740 amount: 0.900000000000
ring members blk
- 00: 2fa3e87a1d6f69a9976006adb559886f5645f9ad0f73876e76c5924ea8b661e9 00089060
- 01: e96ce42f584965a083708ec0e3451b0096b0459766b42c6b052722c93b5bee83 00150531
More details
source code | moneroexplorer