Monero Transaction f2ba0c308d1f025d514334ea87b13f70654504af52e55604bd85c7cfc2190240

Autorefresh is ON (10 s)

Tx hash: f2ba0c308d1f025d514334ea87b13f70654504af52e55604bd85c7cfc2190240

Tx public key: d644946a880b61a478e74ae6bca58e1beff8b5f5586872f591708b68d6a155d9
Payment id: 0dd5d65c3f614d28a78d3884c89096c876756ccce0424667b65ba9d583db01a0

Transaction f2ba0c308d1f025d514334ea87b13f70654504af52e55604bd85c7cfc2190240 was carried out on the Monero network on 2014-06-16 10:57:09. The transaction has 3154833 confirmations. Total output fee is 0.005249555080 XMR.

Timestamp: 1402916229 Timestamp [UTC]: 2014-06-16 10:57:09 Age [y:d:h:m:s]: 10:100:11:49:06
Block: 87800 Fee (per_kB): 0.005249555080 (0.000252195374) Tx size: 20.8154 kB
Tx version: 1 No of confirmations: 3154833 RingCT/type: no
Extra: 0221000dd5d65c3f614d28a78d3884c89096c876756ccce0424667b65ba9d583db01a001d644946a880b61a478e74ae6bca58e1beff8b5f5586872f591708b68d6a155d9

1 output(s) for total of 0.200000000000 xmr

stealth address amount amount idx tag
00: 2ac46ddc6bd57825be58cf3c2773b36f236b7d4d6b4878ac6bddcbe3735b3e79 0.200000000000 57722 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



203 inputs(s) for total of 0.016723334010 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 8a36fbe01db5c7bc8c819dc55bb5ff143924b73aa373bef7cbfc8c8fcf1328f9 amount: 0.000010000000
ring members blk
- 00: 1407a32bab151e88ed520f2136132734058f5082453c063b30cdc341590f5e97 00079470
key image 01: dbd377f6a9fb1ec1e4dfa07f13020d09a475ed8755fda0063b654529c108ba82 amount: 0.000005000000
ring members blk
- 00: 75f610d93301ddddd2604979dda910eabfb7435e90d6f6c2e64fdcb375b60ed7 00077606
key image 02: 4b5cf588f012ad98d0b955c258b4b4e1d9814f49703ae3a526c60a05c6df63ee amount: 0.003160000000
ring members blk
- 00: 8478619a8b2ac5df0a27116e32854dfaaedec29924f3b2f4e5abb2ad40103155 00082976
key image 03: 08a67c1a1168eb149c57c67da0c7e8ea13bd1cf4bbf92cf1a3364a70f6ab4fbe amount: 0.005000000000
ring members blk
- 00: 101b8a53a7dc6955792bbd6b4babef0fb4e0de61bb3c93386a775f73151a37ad 00085530
key image 04: 2005c5391e15a3aaf1f73fc5425932d0ba82e2ce464a728cfef5cf2635d225dd amount: 0.000008000000
ring members blk
- 00: 4facb99e3d8d44c3933c5120fd41ce68b41c8f699ab22072cf66bc9a74b7eeea 00076870
key image 05: 23f16196b90370e78d8b12ae989f761f74791124e674ae67ed2951b43ab5bdab amount: 0.000001000000
ring members blk
- 00: 55dbf2025f6dfab45c81bb50e001b48d843b669060fbb426413aded56136a007 00075932
key image 06: 2a1d34b28e3cb85b178337df0a13e7cd6c510ed4bc8127f57cc34da936590f73 amount: 0.002831971759
ring members blk
- 00: 8ea8648422cb4cd08c7b8b0c0f024489412d28837d7222d9fadbe348dbc08dfe 00086477
key image 07: 098fde7d2029116d09b87fe15ecdf5626dc278cda5c976f734f6d69d23e2d61a amount: 0.000007000000
ring members blk
- 00: cc362064f3d76e7df8945b5b926413438292a87e32fe3bfcf01fb6bdb6f522ff 00072675
key image 08: 6a3c58c194ae19d6fb582b564a0d7acf9431afb9c165581998e7f7b113be3b9b amount: 0.000000362251
ring members blk
- 00: 374d3e315f939abc473e35ec97d4982d01270d24ee41490d8ba4ce0a21cdabe9 00078751
key image 09: 48ee485016515612d76cdfc7367b8c3365d0800ec0431fe448356f44d9bd1951 amount: 0.000700000000
ring members blk
- 00: 5d81b5bd2c501f75a2537f5aa2acc463ec1594c6c50478b69576b66a61a52e97 00075317
key image 10: 15481c16e9ac9dfcc3f7d0fdf775290fec907cea9e10280238fa10567495550a amount: 0.005000000000
ring members blk
- 00: a5464f97aaefeebc0702c10626327f143bbac267ea61876871875c7b4e1b5d38 00075932
More details
source code | moneroexplorer