Monero Transaction 061bbb8d5271ef4b6a6b7a5e86b339155f50b7f3d4c4d6ea46719285ffe852f8

Autorefresh is OFF

Tx hash: 061bbb8d5271ef4b6a6b7a5e86b339155f50b7f3d4c4d6ea46719285ffe852f8

Tx public key: 4f26ef3aa287ce0612db962fb60e28b7607f9d425ec73b7231313c4744d6d889
Payment id: 15934ccec6ce5359e1a69bad3660c4835372e2bd826441dfb6eb7c249d28d538

Transaction 061bbb8d5271ef4b6a6b7a5e86b339155f50b7f3d4c4d6ea46719285ffe852f8 was carried out on the Monero network on 2014-10-09 20:51:08. The transaction has 3096357 confirmations. Total output fee is 0.130201274423 XMR.

Timestamp: 1412887868 Timestamp [UTC]: 2014-10-09 20:51:08 Age [y:d:h:m:s]: 10:134:07:28:31
Block: 253762 Fee (per_kB): 0.130201274423 (0.181643194835) Tx size: 0.7168 kB
Tx version: 1 No of confirmations: 3096357 RingCT/type: no
Extra: 02210015934ccec6ce5359e1a69bad3660c4835372e2bd826441dfb6eb7c249d28d538014f26ef3aa287ce0612db962fb60e28b7607f9d425ec73b7231313c4744d6d889

6 output(s) for total of 13.674545170000 xmr

stealth address amount amount idx tag
00: 50530974a35fddb58b82ceffddc9422e66dc63575a2d56cfee23d8482d4af455 0.074545170000 0 of 1 -
01: bd38bb39069115e3a3417ef506fff5d2ff82ef3f8384c0d890c63c49edfeb2bf 0.700000000000 170077 of 514467 -
02: 809b7c1af5250a42a74e75afce5097192be75bb27a4a220b3424170e06b7f13a 0.900000000000 141920 of 454894 -
03: 8ab05f24fa303a47ad5b67c15b1469305d1e7a0706f38d35fd68fbab228f13ff 1.000000000000 296950 of 874630 -
04: 1e54c1517777a356555e5863d6e522c8e76cdcbfec79f292585ae74e6bfa9757 1.000000000000 296951 of 874630 -
05: fd1833115a6c034fae7de853fc59a7643a62cb9f604c495f44b42e13cd9eecf7 10.000000000000 295610 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 13.804746444423 xmr

key image 00: 677753424973a1b879b8ba74389caa0e497d148879fe38e37209a5ba11028919 amount: 0.004746444423
ring members blk
- 00: 1dc11719b0039decf6cea819d800aee2da9b02254100f00e813e8a473f774317 00140870
key image 01: 0fcc1d34305ab38a94b5de0b3881322aae12f60e82d45f37057340047ff0918e amount: 0.800000000000
ring members blk
- 00: 8291358d21aabbd640c91479ded29cf8baf3b164331108d0bcc702fd8c9875f5 00253033
key image 02: 7beb88662617613f877c5eebfa4c9ad1f1e66fc4986219bda6cb43c29cbf58aa amount: 10.000000000000
ring members blk
- 00: 9fa29a52b99f11c57652766764a2a43a095e45eeacd016246fbe9381c070d63d 00252062
key image 03: 065cee32f9a889ee555ae5669f798404a7c7158d4f6460dbcb332ab2bdf2a97f amount: 3.000000000000
ring members blk
- 00: 8abb2ffd77aab073e5ebbed695e2e9944d01c7ac414ebc1b4b51c2416ae672a3 00253019
More details
source code | moneroexplorer