Monero Transaction 656bd07058bba05674a765075eb24c6f00aacdc817df151ff705f5979ac7613e

Autorefresh is OFF

Tx hash: 656bd07058bba05674a765075eb24c6f00aacdc817df151ff705f5979ac7613e

Tx public key: 4b078f14f2b0bbc5c623847893a9d330d6b01ca1b3bc948190323170dcb19261
Payment id: 1fdd2e7eda6c3264f922062fc6ea1b6abbe7c34c2ddacffab10689a1d6b1458e

Transaction 656bd07058bba05674a765075eb24c6f00aacdc817df151ff705f5979ac7613e was carried out on the Monero network on 2014-10-12 20:00:21. The transaction has 3034972 confirmations. Total output fee is 0.161540962837 XMR.

Timestamp: 1413144021 Timestamp [UTC]: 2014-10-12 20:00:21 Age [y:d:h:m:s]: 10:052:00:09:30
Block: 258008 Fee (per_kB): 0.161540962837 (0.315683102949) Tx size: 0.5117 kB
Tx version: 1 No of confirmations: 3034972 RingCT/type: no
Extra: 0221001fdd2e7eda6c3264f922062fc6ea1b6abbe7c34c2ddacffab10689a1d6b1458e014b078f14f2b0bbc5c623847893a9d330d6b01ca1b3bc948190323170dcb19261

6 output(s) for total of 19.938459037163 xmr

stealth address amount amount idx tag
00: 41ace14524e29c3695134ba31d99647493292e03e52a262000493c9d47b490db 0.038459037163 0 of 1 -
01: d5dc16477aac5e335af86b2bd9116f67a723289ba54a7ab0537757a920b793f0 0.400000000000 240998 of 688584 -
02: b4f8b5333d4fb00a6568c916199d289737fe4ebcb35a31e41e5986e277e9ff95 0.500000000000 375739 of 1118624 -
03: 7416d1ffb6532d4553adfab42c96ff45213e94e593c651cd4c2ad75104b07b5c 1.000000000000 300467 of 874629 -
04: a98bac7d0bb3638f284a0bd1603e6cf6723f8cd21a7dc61d9efeeb3213bcc182 8.000000000000 21064 of 226902 -
05: ceb511741c9bb60ed3888ad8f0b8f5022f87cf23fbac9e1bda20f8babc470920 10.000000000000 300575 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 20.100000000000 xmr

key image 00: 4f166a1fb28b3ef6ea7519946d10edd8566c7139f24aa41aa3f609412a0303a2 amount: 0.100000000000
ring members blk
- 00: 995ed72ce28d4ec0cc4c0d0cd1595649862350817499df68e27418c2af4288a1 00257988
key image 01: 9387789b64c6cda3fb5f7a9b9c3f6445d6158488cf3a6a126ef98b5e76f87073 amount: 20.000000000000
ring members blk
- 00: 7812503fc45a2a0043ba31adbd1cc80e7f51b29f872ef387b3e6abe45b524df0 00256634
More details
source code | moneroexplorer