Monero Transaction 16b08c0a28ba3e9b32d0304b3ac3446dab89dfb6b6973a556f3ae5f43f8b4c2e

Autorefresh is OFF

Tx hash: 16b08c0a28ba3e9b32d0304b3ac3446dab89dfb6b6973a556f3ae5f43f8b4c2e

Tx public key: bd1494cd020b306685ab515abbf748c69c45aaa07aa987316b4e71e71f7cab25
Payment id: a0411ddd5b3aa7b1caa7df005c9d14d8dcef3908cbcd4fdde4cf3129b8dc6fb3

Transaction 16b08c0a28ba3e9b32d0304b3ac3446dab89dfb6b6973a556f3ae5f43f8b4c2e was carried out on the Monero network on 2016-01-03 11:50:08. The transaction has 2393989 confirmations. Total output fee is 0.014557701852 XMR.

Timestamp: 1451821808 Timestamp [UTC]: 2016-01-03 11:50:08 Age [y:d:h:m:s]: 08:330:19:50:17
Block: 896367 Fee (per_kB): 0.014557701852 (0.028722710398) Tx size: 0.5068 kB
Tx version: 1 No of confirmations: 2393989 RingCT/type: no
Extra: 022100a0411ddd5b3aa7b1caa7df005c9d14d8dcef3908cbcd4fdde4cf3129b8dc6fb301bd1494cd020b306685ab515abbf748c69c45aaa07aa987316b4e71e71f7cab25

6 output(s) for total of 8.988477380000 xmr

stealth address amount amount idx tag
00: 6ace14663b639d67657f4039a0a715146b2d0c329bfdf3816c2fcb04fa2d1104 0.008477380000 0 of 1 -
01: 39ece3e92027aecff491990b69dff2d121a234511c4a3de2c0d3cf9b89453432 0.080000000000 178708 of 269576 -
02: cc883f4842779de8fede26ac603dbea13e3cccb82fdba3548f70c2a1ee15bccf 0.200000000000 1054114 of 1272210 -
03: cb0bced01a28f7e6e01d680eb793d069f0f893f2cb2a408ca191f1081d74a541 0.700000000000 405004 of 514467 -
04: 33d477f50d61f3d7e0ba5b4e9ac02c2c7089aea89030d907336897f9e07ecfb8 1.000000000000 667460 of 874629 -
05: 6078f677ba05a88ae11bc8eaab68c0eaca5c75e53d90de17526d81ef9318e818 7.000000000000 164670 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 9.003035081852 xmr

key image 00: a82eff28f0427199dc25f98831c6ea780d75712cdf7e03254413c2eab1127d96 amount: 0.003035081852
ring members blk
- 00: d72dc7697dc9f780d344f8384ac4e0642eff4594feb19068bf88ecdf1bb11c07 00875905
key image 01: 2b3ccaddb9959a312a3fa7f49cdb2ef6ffb46263fc358468cad0237389bc4850 amount: 9.000000000000
ring members blk
- 00: 3ed5e87e7610f832d14e4edc3304c320eed966ca2aea150ad5c6b68c87b8b35b 00853660
More details
source code | moneroexplorer