Monero Transaction 2dba2a948ddae37e0109852a8ccd09dc82383e7ceecc92565fa57d27fbca568a

Autorefresh is ON (10 s)

Tx hash: 2dba2a948ddae37e0109852a8ccd09dc82383e7ceecc92565fa57d27fbca568a

Tx public key: bbef19cbf818887dc54a490d1f65df06ccd20db8601dd76fb918fb2cec3e2fa0

Transaction 2dba2a948ddae37e0109852a8ccd09dc82383e7ceecc92565fa57d27fbca568a was carried out on the Monero network on 2016-12-23 17:33:05. The transaction has 2099014 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1482514385 Timestamp [UTC]: 2016-12-23 17:33:05 Age [y:d:h:m:s]: 07:363:12:26:48
Block: 1207836 Fee (per_kB): 0.002000000000 (0.003330081301) Tx size: 0.6006 kB
Tx version: 1 No of confirmations: 2099014 RingCT/type: no
Extra: 01bbef19cbf818887dc54a490d1f65df06ccd20db8601dd76fb918fb2cec3e2fa0

7 output(s) for total of 69.998000000000 xmr

stealth address amount amount idx tag
00: edfc2aefef06c63e56219e388021260d1102ebf3fe9569a4ac27694e030151fe 0.001000000000 87999 of 100400 -
01: 5bea8db47c44b7a14db3a068fca55f6632e576b441827a0f832f6384d9f97667 0.007000000000 235210 of 247341 -
02: e951f3fd7b32861201c54c6ac0ba915e0a787fdf3a7d09f5d03ca41fc29d8ccc 0.090000000000 297853 of 317822 -
03: 9f186aac4df671814d47051ff911fdffd90cb55d2e13468eb4916da86408d4cf 0.900000000000 438737 of 454894 -
04: bd6f2a4b14efb0940b6406d44bf4b3bb94bf9714498a024fff9c072d37dcfa57 1.000000000000 852709 of 874630 -
05: ba7bfda0e21078f63fe72d41d3e60c7b6f0af1dcffe68ba78ab4151dda97a922 8.000000000000 219221 of 226902 -
06: 858d1a74fea2689bca8ff7bd57b6061ccd13c1851031c0e8040093b4b8602ba9 60.000000000000 24563 of 26317 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 70.000000000000 xmr

key image 00: 56b360b52dcb4d599c9c8d62a7e0030f5b68288a8c22f669d822ff095b3cd017 amount: 70.000000000000
ring members blk
- 00: 16b8a4f18a4622a206d640d2e018573ed630bd42d70ef12920d1b04b56c9de94 00050257
- 01: ed9ed7dd14e54f312b0a26d71717b6c06909138e811b9c43a8de93553a9e8e0c 00905063
- 02: a5c54d8521843079046bf9da398daf1a79ac532b6ca6d35ed006828679934b54 01129420
- 03: f313a539fb6eda242d2f89859e742dd993f725486b7486b23b173952e10004ae 01177116
More details
source code | moneroexplorer