Monero Transaction 1d6dd64df5d52ebc167336946cfec12c2c0861085c4638b0ea354bb0c56fc614

Autorefresh is OFF

Tx hash: 1d6dd64df5d52ebc167336946cfec12c2c0861085c4638b0ea354bb0c56fc614

Tx public key: 9ae351d28293d6b1844e9384573045b535e940e6420b866f076345c060f68806
Payment id: 1ff377543eb42aeff28f7647b1afc52549c2549fbf8bd349ad0497f0ebe79780

Transaction 1d6dd64df5d52ebc167336946cfec12c2c0861085c4638b0ea354bb0c56fc614 was carried out on the Monero network on 2016-12-31 13:21:39. The transaction has 2076824 confirmations. Total output fee is 0.004337110000 XMR.

Timestamp: 1483190499 Timestamp [UTC]: 2016-12-31 13:21:39 Age [y:d:h:m:s]: 07:332:17:42:21
Block: 1213521 Fee (per_kB): 0.004337110000 (0.003795897983) Tx size: 1.1426 kB
Tx version: 1 No of confirmations: 2076824 RingCT/type: no
Extra: 0221001ff377543eb42aeff28f7647b1afc52549c2549fbf8bd349ad0497f0ebe79780019ae351d28293d6b1844e9384573045b535e940e6420b866f076345c060f68806

10 output(s) for total of 4.039662890000 xmr

stealth address amount amount idx tag
00: 76edd653b21ab79996a01bc8b342c3ef4c6706f9e1bf9f0250c7289c197da8f4 0.000000090000 18412 of 23499 -
01: 92cd7aee73a955360ff25000d526d07393e8a36f6f4da9b4788770d43b63eb73 0.000000800000 17755 of 22876 -
02: 328060fa63d2cbeb4c4ab9941ee2ce868adaae73d2023b192fba673bf1b9dd71 0.000002000000 36558 of 41702 -
03: 92eda7190b1cd5229bfb341631638ec23adad14d302634409d193808748fe398 0.000060000000 54021 of 59217 -
04: 265888e191aedaa0eba9891364f7dc99255201dd5fcb3bc54f61f1f55ed4d872 0.000600000000 71767 of 77842 -
05: 3c303f0285a8fe13afac7c04316471b80688ca18d13ab417a3a0c069da3e79d2 0.009000000000 225053 of 233398 -
06: 22857310400bd67ca0d2973493a8163a32f38e496e861906f4e398c989c9aa41 0.030000000000 315169 of 324336 -
07: b250c762413f562974320dd48060787fc46ce7a5ea7bb2648192e5de3daeba21 0.500000000000 1106600 of 1118624 -
08: ccf1381d595913f973b0fd7b462e1fdafe99b9ac18c9b7ea49cdd3de8a89d3c2 0.500000000000 1106601 of 1118624 -
09: e1162ecb4765fbe8740ae1fe012371dbea348b76d963d19c3abc89c4e3c0bbf3 3.000000000000 295410 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 4.044000000000 xmr

key image 00: 8cfef7d8449eb194caf31a309dccb85b7a83a88ad0d7c2525c0fa2874473f4eb amount: 0.040000000000
ring members blk
- 00: f0930d1c5710e0fe6ddb9536fcadd6f47b97a582efef952dfd9600d8cfa0925f 00665862
- 01: aef5e4c1dd27f83e48d1c80a20e2696f69226b95a46ae3a77f46d2bf15cb8fc5 00918058
- 02: 6b55437ef808aa8335d76eb76dad5775dfa3855bfb969c133dd83d19d8683a55 01213418
key image 01: 87269c8ead445a62226b2e4dffb18ae4664c2cdaa735617c7d644b01f3697db7 amount: 0.004000000000
ring members blk
- 00: 596bc1bc00a6c7b03cb5eb6ea4e6f1962bc38162fdc7b8fc0042351143c37cfc 01056727
- 01: 202585344167d4403c3ea627cacda8ab109641d3a064847093c63ad1f6506e12 01078916
- 02: 7977905fd8c02dc7e1d93dd928b3efed5857916002ae7865432d696f1699b36e 01213476
key image 02: 28445107b9a5123afb49b32c4b6f22366a00c3ad739c580301dbfe7c927c75ad amount: 4.000000000000
ring members blk
- 00: ad896563e2886a3897dee29df68c4377d654f6e2672b405e6d54cff3ccadfb0d 00897214
- 01: f4f6e735a010796da99d9c78db2a789f45f78b131f4be7566a39f0940f391215 01101460
- 02: 2ca339f61b84376f8ea54c8495620bc695ce05a6cb4ca45c5f1d1e1ce3875d6a 01213328
More details
source code | moneroexplorer