Monero Transaction 0fdfba47db2f5fd0fda8bc632b8adc97789cb9b382483132f699f51d3ad3fa95

Autorefresh is OFF

Tx hash: 0fdfba47db2f5fd0fda8bc632b8adc97789cb9b382483132f699f51d3ad3fa95

Tx public key: 9a8140061fc9e667decf146804cfd1ee8d6dcda45ea4d6aa0f5aeefb5af29c26
Payment id: 8a6e195e5bad2a61d8beac5c18126470eb75e04b743a2a2c7ac6838a9979d892

Transaction 0fdfba47db2f5fd0fda8bc632b8adc97789cb9b382483132f699f51d3ad3fa95 was carried out on the Monero network on 2016-02-07 22:22:57. The transaction has 2349218 confirmations. Total output fee is 0.026991746596 XMR.

Timestamp: 1454883777 Timestamp [UTC]: 2016-02-07 22:22:57 Age [y:d:h:m:s]: 08:302:16:50:24
Block: 946498 Fee (per_kB): 0.026991746596 (0.039485069306) Tx size: 0.6836 kB
Tx version: 1 No of confirmations: 2349218 RingCT/type: no
Extra: 0221008a6e195e5bad2a61d8beac5c18126470eb75e04b743a2a2c7ac6838a9979d892019a8140061fc9e667decf146804cfd1ee8d6dcda45ea4d6aa0f5aeefb5af29c26

11 output(s) for total of 6.977885710000 xmr

stealth address amount amount idx tag
00: 604f35a0cc8a71c8e4364c3052fa33808db117bcbf0391e607e4e3d6a7db1071 0.000000010000 491 of 22371 -
01: 8c9ecbfd42439e3417397d39d4d6a09620104072cf6b9c5045c8784bf425230a 0.000000700000 445 of 22578 -
02: 659f822d4e6f530ae1e3a393f6e101735da77a3917209ff8ad895b791f85d8cc 0.000005000000 19371 of 42488 -
03: cbf25df81107f8bcb6e0daf8b6d46eaa0ddc47ed3b4507a5ccf40a71069b71c6 0.000080000000 35843 of 59073 -
04: 192824c737145bb430f2c4babaae0817464e6d63968a7a11aba97a75c6c7d881 0.000800000000 35321 of 78160 -
05: 70d1d3dff04e863cf5f71d8bea5aec5af32dc7d9dcac69549424f1eaac9e89e8 0.007000000000 194627 of 247340 -
06: 512d826aa4e95465da2df0a8538e153d2605afab2073f56bd4243655a7f1a5ab 0.030000000000 248904 of 324336 -
07: ac6a70528fb9893aec57b5f48fed1e113e11c8dd7ca95aa7442338ef4cd669dd 0.040000000000 218659 of 294095 -
08: 9d8c9c74fa22a463fa6ec219bfd2654f406f1911ce6cb083d2e95665f0df0629 0.900000000000 332660 of 454894 -
09: 97d018ef604902e80c5fb8a58d0015021314736b5a13e86fd06bfabc87785b6f 3.000000000000 227383 of 300495 -
10: 6b0641fced9b01f357e3985411d7fe1f3622f1ac635bbdcf5cd0876432d878a3 3.000000000000 227384 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 7.004877456596 xmr

key image 00: 93df8fe9eb69b6d257350fedcd1a8e993e2cc8abd25d742bbef349c0b7f1aeb5 amount: 0.004877456596
ring members blk
- 00: 2562b25858e6b59ea9dc9d478b33736150e194f5f9f4eea671d99aa5f9d29527 00946114
key image 01: ebeb64c23669ca744ed79bffd0937993334270494ff860c2ca91927689d2dfdf amount: 7.000000000000
ring members blk
- 00: 3cfe52d1380af67c2ef0a1d4656c647c6efc92320a9eb0788cc412920af6d112 00946391
More details
source code | moneroexplorer