Monero Transaction 55b7079e8218d0b8be534c285dcf406264457e10c4b19faf121350bb9bba341f

Autorefresh is OFF

Tx hash: 55b7079e8218d0b8be534c285dcf406264457e10c4b19faf121350bb9bba341f

Tx public key: eac20d9d8ab58241e385bb77ebac0250ca3f0497b69ef27d4dad5a0661c5d42c
Payment id: fd818f2d72deb932ed820e17f1299b418c22150960c56808540ba94a4901c6be

Transaction 55b7079e8218d0b8be534c285dcf406264457e10c4b19faf121350bb9bba341f was carried out on the Monero network on 2014-07-26 02:06:47. The transaction has 3147373 confirmations. Total output fee is 0.005068960000 XMR.

Timestamp: 1406340407 Timestamp [UTC]: 2014-07-26 02:06:47 Age [y:d:h:m:s]: 10:130:00:00:51
Block: 145048 Fee (per_kB): 0.005068960000 (0.004815041781) Tx size: 1.0527 kB
Tx version: 1 No of confirmations: 3147373 RingCT/type: no
Extra: 022100fd818f2d72deb932ed820e17f1299b418c22150960c56808540ba94a4901c6be01eac20d9d8ab58241e385bb77ebac0250ca3f0497b69ef27d4dad5a0661c5d42c

8 output(s) for total of 5.370931040000 xmr

stealth address amount amount idx tag
00: 2a6c021f3c1b0ec12179dffa7f9b7be31d4c30d3391467f6d822b7bab9c771f5 0.003931040000 0 of 1 -
01: cb4351b9ad93cb875ba057870e3e221095fb097949d1073e00a829748f307775 0.007000000000 165271 of 247340 -
02: 9d15fb209c070e04ebb29cc2a0157dbbb7abf446e7085fb4e9c99125c4e3234d 0.010000000000 318107 of 502466 -
03: 2c084efbcd6490b724c9299921ee139067aaf2ad2dd97a6b94733661e94fd008 0.050000000000 109273 of 284521 -
04: 97812913a096d42190835e3cc5d1c854583567a38edf876877549b3c5f5cd000 0.100000000000 320848 of 982315 -
05: 28ceecd9557755f3d8bfceaad1e5c8b73ff67a9cd43022d4e0a51ae12f5c7e8c 0.200000000000 259285 of 1272210 -
06: ab4e8f0c064d978d419e599929a1733d10af89324233d2803b7fa2388288dcad 1.000000000000 135368 of 874629 -
07: 61375280234d6f3ea8dc4d6a0782346ddac0abe2150cafd5f7ed64dffe802a3d 4.000000000000 27901 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 5.376000000000 xmr

key image 00: 3ed92b0d78b35ab68a7e070de59001b36aaacd72f7434fd2038cbe58d538deea amount: 0.006000000000
ring members blk
- 00: d278fcbb3852fb4f26eb9e65cc7f33b8ce1fab64dffbfca28143e5777c832cf6 00083560
- 01: e59c8e60e17d36972620397c733624c47667ca30c4fb94a82c75e92c86ef9e00 00144919
key image 01: 5fe00e162e8f4308955d6bd8ed0f85dacc338f1e3283c27a2397785c1a69b0ed amount: 0.070000000000
ring members blk
- 00: 4decb83ad9b66364ee1d85e523ea86a6a90b11871374be8bf7a04b4cf9acabcd 00075925
- 01: 2d711b3ba387b8ad31077d9ec1ed448123148fe66df63d0b5031af5f2c02f32f 00145031
key image 02: 9c769fe8ccfcdf1593acdd3ca83bb9f23eb0a223510cc6432c63ff0ce95178fd amount: 0.300000000000
ring members blk
- 00: 32e0db95b934aab333bc24912f2d8669ae0dce02151e3301e3d13358eecf9180 00076287
- 01: ab9ca17450e917363774d618567e515cc6ce1ff3cda941a06ecab9240b37ebbf 00144973
key image 03: fe6e0d8b56800957291b1b68b7efbbb49695ea5b907b0141f547b518f8768475 amount: 5.000000000000
ring members blk
- 00: 30032fd8328f40233004d1ed729e707fff488af9b49ff61ce0b88804dd3a30dc 00124373
- 01: d161e71150473023939fe4996b3cfb96fd9f231f3c86e719014feeeacbd2fd3c 00144973
More details
source code | moneroexplorer