Monero Transaction 16fddf97cada03d7f4ed5c88d0bfd2e44c748a32ca93730fb3f32ce53fd5883f

Autorefresh is OFF

Tx hash: 16fddf97cada03d7f4ed5c88d0bfd2e44c748a32ca93730fb3f32ce53fd5883f

Tx public key: 103655a061772a18f80e12e793c1143728dab700f2971d8d70c9b3e629236c57
Payment id: c94a560e7e2ffd03a9939d642890ee9b7d6d46cb5eb4bb76509fe0309c07b922

Transaction 16fddf97cada03d7f4ed5c88d0bfd2e44c748a32ca93730fb3f32ce53fd5883f was carried out on the Monero network on 2016-01-08 16:07:40. The transaction has 2457147 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1452269260 Timestamp [UTC]: 2016-01-08 16:07:40 Age [y:d:h:m:s]: 09:058:15:28:27
Block: 903786 Fee (per_kB): 0.100000000000 (0.155859969559) Tx size: 0.6416 kB
Tx version: 1 No of confirmations: 2457147 RingCT/type: no
Extra: 01103655a061772a18f80e12e793c1143728dab700f2971d8d70c9b3e629236c57022100c94a560e7e2ffd03a9939d642890ee9b7d6d46cb5eb4bb76509fe0309c07b922

7 output(s) for total of 0.444989046401 xmr

stealth address amount amount idx tag
00: 42703a838d0dad3f56998825141788445a987241add4998fa15ed8ac5985bb04 0.000890089568 0 of 1 -
01: 04499a7a16156266a004124dce95012761db586a4aea8e542c41d05abad6ec40 0.007000000000 193209 of 247341 -
02: 70f2988d4897b588d7c2d3990529d356f345ac69bb5928be7de0b5af9790ad12 0.020000000000 297478 of 381492 -
03: ac79973017cc39fd0ae3cacdb431831783519e066b0fd273eb98fa6a5181d2fe 0.000098956833 0 of 1 -
04: fb63f90dff8424250c67f9b342ef4f40a04124259fe71da5724981ea9e3b2a81 0.007000000000 193210 of 247341 -
05: 1f82e9e479c958c2a5fffe610a37b219f32e1866b15149ae1144f0cdf97627bb 0.010000000000 418762 of 502466 -
06: 3743ef98cf3e61686d08f53b3b1ee757022d5c49fc6df090dc7fbda165a39d46 0.400000000000 537734 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 0.544989046401 xmr

key image 00: 3d4d33fbcca2249b72608fe4ff526b656ec4eefdc77a0a5ba9305636bb8dbe87 amount: 0.004989046401
ring members blk
- 00: 871702c29a41be8274f2256613c038481a4368a0784fcbb97b7b36e2328ca1ad 00886323
key image 01: 758b3dc8917aa39227123ce9adbf0335659c8d7f5ad649906b1218a19cadc0f0 amount: 0.040000000000
ring members blk
- 00: c0b59479961ce63612ba9162108649821228e975cd7842c9e0c5d7def82eaa44 00869838
key image 02: de026922d6a76c3ac98ba178a8a57247c520b54835d45e86421ec889e5bdc1b2 amount: 0.500000000000
ring members blk
- 00: 7295c0df00b5571f86ded5d9ce15bc534088bad5a25635bf236eea5bb0909194 00902357
More details
source code | moneroexplorer