Monero Transaction f2999f9daefacbaf204fc221e44bae0b13ae25725e04d756aceadc2d4c42bc5b

Autorefresh is OFF

Tx hash: f2999f9daefacbaf204fc221e44bae0b13ae25725e04d756aceadc2d4c42bc5b

Tx public key: bad910ab52c7b62889f24728b1de73e3f716419f2eaf3cca457592fe0941a12e

Transaction f2999f9daefacbaf204fc221e44bae0b13ae25725e04d756aceadc2d4c42bc5b was carried out on the Monero network on 2014-06-12 15:33:43. The transaction has 3209835 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1402587223 Timestamp [UTC]: 2014-06-12 15:33:43 Age [y:d:h:m:s]: 10:172:21:02:59
Block: 82177 Fee (per_kB): 0.005000000000 (0.005878300804) Tx size: 0.8506 kB
Tx version: 1 No of confirmations: 3209835 RingCT/type: no
Extra: 01bad910ab52c7b62889f24728b1de73e3f716419f2eaf3cca457592fe0941a12e

19 output(s) for total of 8.995000000000 xmr

stealth address amount amount idx tag
00: 2bb115363faa196d31e981b913c133f8d9b607cadddf2a9d54ace7a6367f8d63 0.000750000000 1621 of 2270 -
01: 8504c8fb6fe22f51efef878a521489ee803040cff6baf48261a281690f86dd74 0.000870000000 1412 of 1985 -
02: f3e415098819deece94b4fe29d2e1627cfa376eca5b0569a8679898e0053ffbc 0.000940000000 1525 of 2159 -
03: 4fd2fb44c51815693d9f6d41dce91e0c26ef6e5c2df73ffafe450df08342e5e6 0.001030000000 280 of 408 -
04: 120f29b4bc4a309b159ea917611befca5e237b28e8bc86f43da3afd1b38477c5 0.002250000000 293 of 416 -
05: 2fc0da13b06b088bf2bcedacd8865f4729577e1515d5b26058203512e2604e29 0.002630000000 281 of 401 -
06: d8b49f19be6767e4afe0c2b082308e66c79b98ce1441fe2904a16700a555f3f4 0.002690000000 272 of 409 -
07: 11c741c1fbc83f0f003aa1012bc80c8c922fff23ddf4368f1269c2cdd0b3b886 0.002690000000 273 of 409 -
08: 18b9cec078cdc427a432590be3830e0aacdd9bcf7fc84408c2fcabe72944b179 0.004010000000 237 of 330 -
09: 3482b6524cf6faa5eed301b6a72a3611b1492e8dd8587630041bbcdf3a9d4553 0.004140000000 276 of 382 -
10: 06cefb374c790598893edcec03d85f8b4543271fa7943795ac801e6fb7a7e7e4 0.006000000000 93186 of 256624 -
11: dde423208c99ee571f2ad1151dfb234bf933cf3b5e87030f17592ee98fe3a013 0.008000000000 84378 of 245068 -
12: d279642f9323708d46313f9452ff06faa137a4e06c8a5279d8883c34086db203 0.009000000000 81449 of 233398 -
13: 18f19fe92bebe76ded12fc1d97907226cd56b4d2c22914a18e319756226bcc03 0.010000000000 173842 of 502466 -
14: cae7086ad5e332e2ee82cb95469c65ff1f67d6ade18890efb517d7add930d504 0.020000000000 108314 of 381492 -
15: eba974fac0d090425d1acb0eac57d4c1f41da1b1b26070ffa42d8b51a4bdce3c 0.030000000000 78727 of 324336 -
16: d3899bc0c28cfcb385dc1f4adda2d6d6aafdad3541e7ac8dd5f23906aa00a316 0.090000000000 37045 of 317822 -
17: ff55590fbb8c80f58a547755801cdfb47198c48bbb29737b4653db9c85dfd638 0.800000000000 15795 of 489955 -
18: b397feabd5861f86c1b087f0a373044076b42b8dd60d10f7e161c6328b0d162c 8.000000000000 3438 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 9.000000000000 xmr

key image 00: cc7353a596d49c7b6421a56a43d2c11d18a2ea8b0a2e519f34ca1f31520e849b amount: 9.000000000000
ring members blk
- 00: f67adbc9fe24641fb2eb474ab91a5a7efa0579a367f3386aecadb50f7eb8cd9a 00082151
More details
source code | moneroexplorer