Monero Transaction 01dee6f4ca72bca988d26cce0038633fc5137829a39e070b15fc282ddb9bb9e7

Autorefresh is OFF

Tx hash: 01dee6f4ca72bca988d26cce0038633fc5137829a39e070b15fc282ddb9bb9e7

Tx public key: b2d67edcc83750d798c01074e9cab906c121f8a214c98edca9f3aacf320f3cad

Transaction 01dee6f4ca72bca988d26cce0038633fc5137829a39e070b15fc282ddb9bb9e7 was carried out on the Monero network on 2014-06-12 03:09:57. The transaction has 3197058 confirmations. Total output fee is 0.006640503564 XMR.

Timestamp: 1402542597 Timestamp [UTC]: 2014-06-12 03:09:57 Age [y:d:h:m:s]: 10:154:12:55:34
Block: 81372 Fee (per_kB): 0.006640503564 (0.008322981211) Tx size: 0.7979 kB
Tx version: 1 No of confirmations: 3197058 RingCT/type: no
Extra: 01b2d67edcc83750d798c01074e9cab906c121f8a214c98edca9f3aacf320f3cad

15 output(s) for total of 0.063360000000 xmr

stealth address amount amount idx tag
00: bd63a91cd00f74c8d86207890b420767e659f7cf0bb5d7dd5953d9a2b4f2c9b9 0.000270000000 1502 of 2089 -
01: 6bcb640236d495ea3fcd5d39d70990c45f8c2d336b35666de308cf2a0f67bc95 0.000440000000 1461 of 2162 -
02: ca3fa25c7b84704bafc7b3d62909d73fee64b6d4ca5d784bd84965c217815589 0.000440000000 1462 of 2162 -
03: 173a9604bb414d92603dbc83fa0774e5c1e65d3bbb4eb118aefa2b97f7dfd493 0.000450000000 1506 of 2220 -
04: a380b3efa474b6cf390f5665ed6886791f8525372e61c751335025dbb32933dc 0.000870000000 1381 of 1985 -
05: 93acec8b0e4f55e85f1c24e528998d85f75c687314b94b0478fcb9f34b1ed0e3 0.000940000000 1492 of 2159 -
06: b7fd4bc7269bfb948f7f0668cb2503c59b05a55d24d5d03f49b3910d17150c6c 0.001340000000 292 of 427 -
07: 55797b4ad6d43f048dc85e07448eacc61ef89f7ce2db683c2211ace1ac69ee44 0.002360000000 321 of 439 -
08: 6582a28c9431164903f6f50de1aecfac08d52cfb37597e5d00af93bcc9bea7e6 0.003080000000 251 of 379 -
09: 04771f0b7ef744bfd7d8bbe134e7866c8f93bb4efdf1e8bfe6901710da39e7f5 0.004170000000 269 of 385 -
10: 98b48d9dc51311e9eefcd578f984ec286e9a22e39bedda451083adac94039555 0.005000000000 94189 of 308584 -
11: 73a6eb437bc74b57eb2bec6fa991baaaab7c767ecebc246e2f323e5f9636fcd0 0.006000000000 88696 of 256624 -
12: 6f816724767d582b40eddd705dcc36f10dc8fb3a371967b40da2d0871cb24756 0.008000000000 80390 of 245068 -
13: 1c79a3b46e047ef3070261ff9e172ae83192432e7d0ff5210337ff18b8ec44f6 0.010000000000 164997 of 502466 -
14: c35cd9059bf87d9ae4635867e45f0aa7d7f19cb2a1aa2bd5d9543a43f2b0bded 0.020000000000 103198 of 381491 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 0.070000503564 xmr

key image 00: 5af8bf57b9e5da163b8b5332bbbaef3bd14225df447778526a41fa80e3c38e48 amount: 0.000000503564
ring members blk
- 00: f46e734daadb07ed63b13dc422d72656111328b8d34b1794e3425012f9ff4074 00075705
key image 01: 51e8e6276aa2e4c9416e43423cf24e582c5cd23094d34c9698c38fc45e6c4299 amount: 0.070000000000
ring members blk
- 00: aa02401666aa3cb61268fd62f136bf34bef87269556d69071b87ed9db01b811f 00081084
More details
source code | moneroexplorer