Monero Transaction 16aac0a73e96a79137b4a6a29a29dbec0e076c530b189f0bf9eef837dd6bffa5

Autorefresh is OFF

Tx hash: 16aac0a73e96a79137b4a6a29a29dbec0e076c530b189f0bf9eef837dd6bffa5

Tx public key: ec76fb1eb38ca4f39e25a7b15297e7784b388efcb7ec0c3eaa9c3aa8954ffd15

Transaction 16aac0a73e96a79137b4a6a29a29dbec0e076c530b189f0bf9eef837dd6bffa5 was carried out on the Monero network on 2014-06-10 08:41:20. The transaction has 3199515 confirmations. Total output fee is 0.005250000000 XMR.

Timestamp: 1402389680 Timestamp [UTC]: 2014-06-10 08:41:20 Age [y:d:h:m:s]: 10:156:04:47:17
Block: 78843 Fee (per_kB): 0.005250000000 (0.005513846154) Tx size: 0.9521 kB
Tx version: 1 No of confirmations: 3199515 RingCT/type: no
Extra: 01ec76fb1eb38ca4f39e25a7b15297e7784b388efcb7ec0c3eaa9c3aa8954ffd15

19 output(s) for total of 0.499750000000 xmr

stealth address amount amount idx tag
00: d5ce5bc8e52b917225a5aacde6282cad05deda5f3a3e71ba3f58c4add7fe1e89 0.000310000000 1310 of 2100 -
01: 1cb006d940f5888a8f62dc8505995e3a0519d14dd6664d7002be4e1c311f30e7 0.000310000000 1311 of 2100 -
02: a66bc7fb3a1bca0af69a2dd5191e02b1028ca5bc36f420746cd11a0465520a75 0.000310000000 1312 of 2100 -
03: d0e9bc3f956241f4a81953446574c46704351c9e157642a7dc2fdb7e86f7ebc5 0.000630000000 1361 of 2172 -
04: 0fb45766fc6371a3ba70ac0cbf2daa92b9379b078cd3bf9e406e2eac795b35ac 0.000840000000 1326 of 2105 -
05: 98dea855315cf86667692b3bf169981baee9a6c518dcb95b7e63a861bfa0e711 0.000960000000 1376 of 2150 -
06: becf87389c1e66d9e8ba322577e4508c859ee826a84d9e0f3912ff396fead47c 0.000960000000 1377 of 2150 -
07: 5dc501fb6526d80fbc8ad9f9eebe67e0a718394e630fbf13ce05666cbeee27fc 0.001160000000 250 of 397 -
08: 72466178787c7d559ba1ce7955ffb6d9c9c20c0bd6fbb3cd28c993f9ddea35bc 0.001160000000 251 of 397 -
09: e75c56151e46a3569748ac3596f963918f44f4271bd2bd308698a0c56a143013 0.001280000000 244 of 396 -
10: 1aac9e7d62d03e7a0d2cf26ce84bc8ff2ff881b29c9f1a0f38d54e2606ad2ab9 0.001280000000 245 of 396 -
11: 5121c3167003195ea9a42ece96d51257b25a49621f387edf36bcf1844916b7b9 0.001280000000 246 of 396 -
12: 3d9d3320398bd069ad1f20d324fd376ec1ff01b36e588b7eb00af0afa9cbf043 0.001910000000 245 of 400 -
13: 4133bc8e16225d74f2c54a38cb064ff25576b44950cdf47737fe28d300dc93bf 0.002780000000 236 of 402 -
14: 130bcffed0f216cc6d4fcd3449dfe2759389cbaafdf0abd7caf4e19bab5d3e34 0.003090000000 215 of 362 -
15: f7f8a28ed7f551bd2e2a5e819aacff3f48763ab8775c53c9b3c5f34c6860b7e2 0.003490000000 237 of 366 -
16: 1e657bffa905fd07212f6e4366920ccf51a68f4038b366e7a9fbed8d78a1ce58 0.008000000000 70249 of 245068 -
17: cc2fdad8a6658e182fe8dc8fe068246b532b34ccb0f5746e3e3aa7f1a1c6d738 0.070000000000 36321 of 263947 -
18: 350481afc44160789e42127e3a958521290e8dad91b41e5e9895409796fefbe3 0.400000000000 25001 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 0.505000000000 xmr

key image 00: ab621b906f2e9562467bc00d719c752d797d0ced3a150d1920e201ba34481338 amount: 0.005000000000
ring members blk
- 00: 73daf40af1189ad46ed3d980df811a999a6bd8dd8bc98f2ee9434e04e478e59d 00077965
key image 01: 747eb042d200a5de42dc031f26604c7c84dc37510be5d5e8d372f8c4129075c9 amount: 0.500000000000
ring members blk
- 00: 5f4dc167d98ce7355a717844d6f5e9dd9ecea98f86c031bc01d98deb35483b5f 00078818
More details
source code | moneroexplorer