Monero Transaction 66a50ab3c7bb89b8f3a4a23b1f10378ac05d3931de6a6edaba3c6581150142ea

Autorefresh is OFF

Tx hash: 66a50ab3c7bb89b8f3a4a23b1f10378ac05d3931de6a6edaba3c6581150142ea

Tx public key: 3562c90c213f5e1455ce1b0278b26b01ba9943cdaf56c5cc283f3a5fff255689
Payment id: 41b1d8086c7a7cab6a85520a58fcbfe898d5a064e6f8ea89d5b1cdb9e80bb1da

Transaction 66a50ab3c7bb89b8f3a4a23b1f10378ac05d3931de6a6edaba3c6581150142ea was carried out on the Monero network on 2014-06-23 18:16:00. The transaction has 3188922 confirmations. Total output fee is 0.009692833300 XMR.

Timestamp: 1403547360 Timestamp [UTC]: 2014-06-23 18:16:00 Age [y:d:h:m:s]: 10:155:08:42:28
Block: 98468 Fee (per_kB): 0.009692833300 (0.019050789442) Tx size: 0.5088 kB
Tx version: 1 No of confirmations: 3188922 RingCT/type: no
Extra: 02210041b1d8086c7a7cab6a85520a58fcbfe898d5a064e6f8ea89d5b1cdb9e80bb1da013562c90c213f5e1455ce1b0278b26b01ba9943cdaf56c5cc283f3a5fff255689

6 output(s) for total of 50.080307166700 xmr

stealth address amount amount idx tag
00: 698a83d098cbbfbb369de7bc652ad81bc9a05dea15f8cfc17e051c89bc04967e 0.000307166700 0 of 1 -
01: 536712e58193c134b75a428a331c370a01f96526e1a06e7f2d0efc11d2a64797 0.030000000000 139917 of 324336 -
02: d2c9d6e4564043cb368fa8841aaec12a35e009b37131eca902869c357853f21f 0.050000000000 97178 of 284521 -
03: 18c0da6889f7c82f9cfaaeef04fb9f71ce98cb2b6f184b76f03808f9550c010a 2.000000000000 19739 of 434057 -
04: 4acfce3eadbfbb390b386426d877fab89c1f04149701cb3213bf63abed25c55b 8.000000000000 5900 of 226902 -
05: 21a4fc95f7504d6bebd280f57bbdba31ee52ec71d37d1d481827e84ecc81c48f 40.000000000000 1163 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 50.090000000000 xmr

key image 00: 4adfab89864e611e6cb54c4fcf9ed5e154ff04d35e5cb33e06f3338a34dc105d amount: 0.090000000000
ring members blk
- 00: bb50a5e58a41c1d0a79c6523c8d9671cdde14105a3df53d372f92131ff6a34c8 00094644
key image 01: f35e3bbb5648619d901653ef3ef87f5fc9576a6c8aa488d73c64ab2c40094d91 amount: 50.000000000000
ring members blk
- 00: f022800288acd1fe8a891f57d9f34594c29054ec03047b76db530a6713b6358c 00097108
More details
source code | moneroexplorer