Monero Transaction f50780bbafcabb12127b0ac31fcb8ce84eb32848f4761e315e7d54f5ac9c4f2c

Autorefresh is OFF

Tx hash: f50780bbafcabb12127b0ac31fcb8ce84eb32848f4761e315e7d54f5ac9c4f2c

Tx public key: a3a212af7d593903e4f829819e6d7987fd15aab33dfbfcbd9291c0a16d471236
Payment id: 87b306924d34b6956d96a168e7f8f093d4da5fe5cbebf227e74f4d1c2a37d232

Transaction f50780bbafcabb12127b0ac31fcb8ce84eb32848f4761e315e7d54f5ac9c4f2c was carried out on the Monero network on 2014-10-12 09:35:37. The transaction has 3044291 confirmations. Total output fee is 0.174610950838 XMR.

Timestamp: 1413106537 Timestamp [UTC]: 2014-10-12 09:35:37 Age [y:d:h:m:s]: 10:064:15:42:31
Block: 257437 Fee (per_kB): 0.174610950838 (0.285625580924) Tx size: 0.6113 kB
Tx version: 1 No of confirmations: 3044291 RingCT/type: no
Extra: 02210087b306924d34b6956d96a168e7f8f093d4da5fe5cbebf227e74f4d1c2a37d23201a3a212af7d593903e4f829819e6d7987fd15aab33dfbfcbd9291c0a16d471236

6 output(s) for total of 12.832343170000 xmr

stealth address amount amount idx tag
00: 61d059aac8c2ed5396c005aeb45d8e821152dd5ca5e6a46e18f3ad57dc547c07 0.032343170000 0 of 1 -
01: a2735d0611ea818d8cfbacb10862163e7db5c6216a37edb487b5615a187fe3ad 0.100000000000 594340 of 982315 -
02: f9020879f28a8d14c5c8219b2690bd86ec29209b04f3f78fb0bd616079905b22 0.700000000000 172089 of 514467 -
03: 78d617d57a810a61ecfa4a1044feaa871211c6f26a5201d84db30c271ba794f0 1.000000000000 299880 of 874630 -
04: 2b1bf99c6a6e57df6c381c619368123807bd91c98ba2db876dd050852d86e63c 1.000000000000 299881 of 874630 -
05: d2a69993c4fc68121f73a201b0caa456e2969b8d46566e70ea27911e309f9451 10.000000000000 299899 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 13.006954120838 xmr

key image 00: 470d3ec1ae38fa6a4052c923f31de1a24fc58e86c7d2dc057e738a23c74fd9eb amount: 0.006954120838
ring members blk
- 00: add17b09fec2b69f5c1957af65da66680ac0d1345f6890e57380e6b2a1055d57 00219228
key image 01: 539391f13325ca74c2f9dfa4745e2c90a7517526377fbf22eff4da77c9be0eff amount: 3.000000000000
ring members blk
- 00: 3a2a6405b8a49d0d95a5ef2dd4bbecabbc5c2cd5d94bb418c42897a863a77094 00256049
key image 02: 6c4e38f705f13c85489d4f1e4a509e73a7caa21e6060930e3143d6e8abad8772 amount: 10.000000000000
ring members blk
- 00: 30ddbda547f44480b7d51cff35a7b6aafd95c8763637e1c9f225a69190ef3d46 00254823
More details
source code | moneroexplorer