Monero Transaction ff45a96bd139783eb21394071b7dff66755c271637d6137c07fdac83e7a1ae33

Autorefresh is OFF

Tx hash: ff45a96bd139783eb21394071b7dff66755c271637d6137c07fdac83e7a1ae33

Tx public key: f82e1f90413359d5d3d5bbc28bddb3b89e80244c3d9840a6d555b2c5c8dce0eb
Payment id: e1126ca1ec0c4fd1928d253610a7ddd62548408131514ea2ba30aa24345f414e

Transaction ff45a96bd139783eb21394071b7dff66755c271637d6137c07fdac83e7a1ae33 was carried out on the Monero network on 2016-12-03 01:32:28. The transaction has 2125879 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1480728748 Timestamp [UTC]: 2016-12-03 01:32:28 Age [y:d:h:m:s]: 08:035:16:30:30
Block: 1192914 Fee (per_kB): 0.010000000000 (0.018892988930) Tx size: 0.5293 kB
Tx version: 1 No of confirmations: 2125879 RingCT/type: no
Extra: 01f82e1f90413359d5d3d5bbc28bddb3b89e80244c3d9840a6d555b2c5c8dce0eb022100e1126ca1ec0c4fd1928d253610a7ddd62548408131514ea2ba30aa24345f414ede20f59fd87dc4d78504591d1fa663de486c046fc7cb0cec447f58e125b2e12f7c79

5 output(s) for total of 2.990000000000 xmr

stealth address amount amount idx tag
00: 06f282c644edd0f93600489ec78e4ee74d82b7ad6a618f393b0ecdbcc05afffc 0.030000000000 305781 of 324336 -
01: 0eb70aa1a47aa25047a8d971bbf4bf58777e27dff4587ae6e764448a595c296e 0.060000000000 247624 of 264760 -
02: b27446234402c195d7dc196a258218a6f57af1f6bafcbab803c47e03c06b66f0 0.300000000000 927419 of 976536 -
03: 7ab2c1254ced5246d98ad2f57bfd1aa926095ba482fb1c8f09b377f91f374b5f 0.600000000000 632584 of 650760 -
04: fec65c209c9fc96d59d4464420d52f1a56bfb5678137f4b2196f87c95f1eac79 2.000000000000 418751 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 3.000000000000 xmr

key image 00: 521872b3daeb16a9e6bcea387637c387ec528126a00fdae0174ac3be37baab5d amount: 3.000000000000
ring members blk
- 00: 932df7c30dfed9d3e85a4942be59aae402cd07412f26aecb393acff5d24e7bb1 00243090
- 01: 26cf49dadb8bf805168553386c160beb6850d7f9072918df1bce53175af52dba 00289324
- 02: b770ca9faac2987e1816bb297777a8a6cca7aa5465c160a1d0942917ef2e79b3 01192769
More details
source code | moneroexplorer