Monero Transaction 0d9da2d3750972f0d8bb7487cc3d4853bd893b54e138228fe5fd7c0224d50ec3

Autorefresh is OFF

Tx hash: 0d9da2d3750972f0d8bb7487cc3d4853bd893b54e138228fe5fd7c0224d50ec3

Tx public key: 7039b8ec3c0f91eb8d6e028340b5ae15d22b3eefca3fb99e38cdb61bf6ba1772

Transaction 0d9da2d3750972f0d8bb7487cc3d4853bd893b54e138228fe5fd7c0224d50ec3 was carried out on the Monero network on 2014-06-18 12:58:54. The transaction has 3196472 confirmations. Total output fee is 0.006989249056 XMR.

Timestamp: 1403096334 Timestamp [UTC]: 2014-06-18 12:58:54 Age [y:d:h:m:s]: 10:160:08:42:10
Block: 90756 Fee (per_kB): 0.006989249056 (0.006875111463) Tx size: 1.0166 kB
Tx version: 1 No of confirmations: 3196472 RingCT/type: no
Extra: 017039b8ec3c0f91eb8d6e028340b5ae15d22b3eefca3fb99e38cdb61bf6ba1772

12 output(s) for total of 22.073458217334 xmr

stealth address amount amount idx tag
00: 69bfa54989c0380b6adfc7c3d461175bff4c312aa4b3f7ec8560b3430df0a38d 0.000537664049 0 of 1 -
01: 2e056e182b1de594c980c573bf5f55f91c57eac3c7e3ac509d1f87fcd5479aa7 0.004920553285 0 of 1 -
02: f159c71dddfa4a048d3511c269d44b9b691654ad5d011c8889082d6487a55462 0.008000000000 129617 of 245068 -
03: e085cfda06b8c1b1426956a4c0c275e8933ea4e57d7e4ab0ab69150676212dd3 0.080000000000 59634 of 269576 -
04: 8eec13b019fdd6bc9abed6759becec8ee9d26e8efedb7b1c8bcea3c0bde43b08 0.090000000000 55327 of 317822 -
05: 3509ad98f87256325fe001d21c76aa1f67412471e65fc4f186374d7a6157e33d 0.090000000000 55328 of 317822 -
06: aeced4d82887f247160dddb14d27646f4b7985127b244dc777d777e94b165656 0.400000000000 36964 of 688584 -
07: da9d27aa85f495473dcc26ec7c34d7a738b5fdabeb9a113b96fffc72178d5102 0.600000000000 23614 of 650760 -
08: 6da4c7e66ad875754461ed043b0f69d21b592785c892128f2fe974bcd2b6f30d 0.800000000000 21375 of 489955 -
09: fdac8e4cbd7f131cc1f419013619d518a53ae99c3dc8dfdba007b6c7da5e8523 5.000000000000 14374 of 255089 -
10: 944b0d48b0fd765165151af448320d192ca47212d62e93ba077f0dbf860ee61b 5.000000000000 14375 of 255089 -
11: c6d4675cf668c27ef854b2b4e40a585a6cf9c042790c0efb00a2e1026f1a4ba1 10.000000000000 96669 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 22.080447466390 xmr

key image 00: f1f0acaf91487f1219a77354c65277de1a7c8674fa0b2da3d6baae1ddbae0c49 amount: 0.000447466390
ring members blk
- 00: 80bb7364e3f8acce6430b1e57d36d907d737960cdfab34fce3c3cdccc7685f10 00089670
key image 01: 40949c7d54209e25e9cceda84927bd8f5e0b8edbdbf77f725b45e76b65599db0 amount: 6.000000000000
ring members blk
- 00: fb731a7765b0643cc10f31a8403834e5c05d2cd1ddf485471fd23e54da852eea 00090694
key image 02: 0c40472c040670d0f0c21aa10b8e309bb0a779d08293ad330bec7c47a8a113f8 amount: 6.000000000000
ring members blk
- 00: be0404b8fa11527370c1778167df38a6e539efdae847a3f81f84ed838f44e3d4 00090668
key image 03: 1a936eb49892e3d478a4ceada99c99f35d33dd8419b421c71aea92d9911c39f3 amount: 0.080000000000
ring members blk
- 00: e18c46150fd769dfd4c92b240f047aaa88e5271ab72b8a17501d5159bc0e3454 00090611
key image 04: 9f224ac36e2fda22b56235d3d59ecefd75627418292265ba476eee892bd1b925 amount: 10.000000000000
ring members blk
- 00: ff7cf52c1f36650f50fdd0fb34499910ad83fda60a1aaa45473c359588fbcf04 00090694
More details
source code | moneroexplorer