Monero Transaction 0d3442d686fc0fef44bf807e7908d7604acc27ea9bd3957bbe4bd2049f0f7ba5

Autorefresh is OFF

Tx hash: 0d3442d686fc0fef44bf807e7908d7604acc27ea9bd3957bbe4bd2049f0f7ba5

Tx public key: 7bf8d4844e83ed514450ecfa3fa5ced481c20a8af8ab40f36ccabc33cbb747e8
Payment id: e816fc5211f8f3383f65e8fccab92662c1926a690daad51507418bd490d268ab

Transaction 0d3442d686fc0fef44bf807e7908d7604acc27ea9bd3957bbe4bd2049f0f7ba5 was carried out on the Monero network on 2014-10-01 09:15:59. The transaction has 3059994 confirmations. Total output fee is 0.102826628491 XMR.

Timestamp: 1412154959 Timestamp [UTC]: 2014-10-01 09:15:59 Age [y:d:h:m:s]: 10:075:12:16:56
Block: 241639 Fee (per_kB): 0.102826628491 (0.143257779013) Tx size: 0.7178 kB
Tx version: 1 No of confirmations: 3059994 RingCT/type: no
Extra: 022100e816fc5211f8f3383f65e8fccab92662c1926a690daad51507418bd490d268ab017bf8d4844e83ed514450ecfa3fa5ced481c20a8af8ab40f36ccabc33cbb747e8

6 output(s) for total of 14.989808650000 xmr

stealth address amount amount idx tag
00: d3ec6900042565cc6b3db9f935ea5296e724ee361b47e3f353301629a75c8c65 0.089808650000 0 of 1 -
01: bd3efee6a1a2570303623c60544d30aa89fcb30d83cb9380c9185dccd1e424f5 0.300000000000 262799 of 976536 -
02: cbd967c50f379fbaab502794405a362aa6b382b75553c11df384d4f3401adb97 0.600000000000 223038 of 650760 -
03: 9f669771711105c80b0064f550a52ec7a192116f3b51c6b4255fb15406238f5e 2.000000000000 109658 of 434058 -
04: 27e1b6b902718f24b8e7ac0156196d218789a765099c39af9cfcfe51052051b0 2.000000000000 109659 of 434058 -
05: affaf58ce50797742ec53ecf610ad508a682b929e47f37ee69d35a1e5a47dab1 10.000000000000 281337 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 15.092635278491 xmr

key image 00: 04abeb6e40e658e5e530f29ed651f6dad354bf0c23c4413324cc9f82a41aedec amount: 0.092635278491
ring members blk
- 00: 8ba0021f286358acc2b711dc2304fa6119bcae8bf6b6379d05594861317538a0 00227653
key image 01: 1ab24edbd7c2d6010d52fb5620e44222d20932a240600d20da9099dcc86de593 amount: 1.000000000000
ring members blk
- 00: 84b849eb8784c06300d3fb5d897203f43b1187ce8066925946f3008748f52c89 00241372
key image 02: ded8dd8d9915cac581a3863d35dfe8bf1d788e32d1984939ee39f8a019395d77 amount: 4.000000000000
ring members blk
- 00: 7b51ae40373ff6dba7db426997aeca5428a0c60e98c1a802f8fef31d1d35bee2 00240375
key image 03: a133f47367424f7ed02ab53c8c60324ec5910b220d5011aead5b098a4cde84a0 amount: 10.000000000000
ring members blk
- 00: f124dfa925a75613693a49438ebcb113250bd332547f1a1bde2406aff7c25dbf 00241464
More details
source code | moneroexplorer