Monero Transaction 2dfa60bfb580c67ea899dd722218415fe93adc8de54eaf327a0e1557000e8fd1

Autorefresh is OFF

Tx hash: 2dfa60bfb580c67ea899dd722218415fe93adc8de54eaf327a0e1557000e8fd1

Tx public key: c5999923c66a933eb17e84412d71205cec9583c7e2484b6157724836364528cb
Payment id: 006bb73031bcf6ac8588d0dfda9988c383d0a2f9d5be5a26a445ba4611b48494

Transaction 2dfa60bfb580c67ea899dd722218415fe93adc8de54eaf327a0e1557000e8fd1 was carried out on the Monero network on 2016-12-22 03:39:15. The transaction has 2102949 confirmations. Total output fee is 0.002767930000 XMR.

Timestamp: 1482377955 Timestamp [UTC]: 2016-12-22 03:39:15 Age [y:d:h:m:s]: 08:003:20:31:50
Block: 1206660 Fee (per_kB): 0.002767930000 (0.004078216288) Tx size: 0.6787 kB
Tx version: 1 No of confirmations: 2102949 RingCT/type: no
Extra: 022100006bb73031bcf6ac8588d0dfda9988c383d0a2f9d5be5a26a445ba4611b4849401c5999923c66a933eb17e84412d71205cec9583c7e2484b6157724836364528cb

10 output(s) for total of 8.997232070000 xmr

stealth address amount amount idx tag
00: 5221ea3ae4f20d16d794ab7ce587c0dd8a6e74007675eb1f1cc223ea47a7d116 0.000000070000 15752 of 22271 -
01: 8820f134f60817c5dded19d96c637ed8389abc311ac26efc5457c964c7dcee5b 0.000002000000 34899 of 41703 -
02: 2171988f86d352994e89a6f4800b462a75b52d21e9ccd3a7947f5a269090222b 0.000030000000 52634 of 59485 -
03: 9658faf614872b7bb3ebeb059820d43749b5bfa5d4595fe2a45880ead4b8e6c0 0.000200000000 69382 of 78038 -
04: 5d3dec3ebe80eec2e5b884809a4db98bbcabd227b15d71f8e530388505da6ab7 0.007000000000 234620 of 247341 -
05: e7fbdb3e610e124daa032f1a0c0e21fc2c04a33b07eeec4b1b9e4499004c3256 0.090000000000 296867 of 317822 -
06: f3f135ee45c5a9ddae824d24d8128bac45829ef7fc28e73727d158e406c04a3e 0.400000000000 670451 of 688584 -
07: 248e8ade128684efde2e44f656f9976f7c3c1f43dc76f67358dd108b1a400de9 0.500000000000 1100006 of 1118624 -
08: fd96d74aa19f75445f9de376a1f6d7252ab07a04e0b4d25d9af0726462c1805d 2.000000000000 423788 of 434058 -
09: ba84e8420f3059f764f61d8d500082b2622c2c9a94b272684feaf5222e001631 6.000000000000 201631 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 9.000000000000 xmr

key image 00: dba53624cb9482ecf65a88535bf3ce72dd4a346b3a5714a15c275c83f811db33 amount: 9.000000000000
ring members blk
- 00: d4cb0789eb2f26e3af20214e9dc3ea5cc5ee8bea5ff9dd18ecc562a62197e315 00979222
- 01: 0eed725c41c43fe81bb23f2da0e2fe0b8efd85e2bfd9d0d8688447f8b46e970c 01169758
- 02: f6700cc7524cd075ea8913507ba96c34768de066a28b4008a9b0a1f6ec544536 01206532
More details
source code | moneroexplorer