Monero Transaction 66aff354741456d29d29f7a278bfc9c3d5d8d0ae32b664691482448caa0cb58e

Autorefresh is OFF

Tx hash: 66aff354741456d29d29f7a278bfc9c3d5d8d0ae32b664691482448caa0cb58e

Tx public key: bee861a817c79e6a5988d73e1bd43ea1ca09c7ab2b4a42b2b136f7e26692a0c7
Payment id (encrypted): 46cb1aff00f5de33

Transaction 66aff354741456d29d29f7a278bfc9c3d5d8d0ae32b664691482448caa0cb58e was carried out on the Monero network on 2021-05-28 11:30:12. The transaction has 918147 confirmations. Total output fee is 0.000013180000 XMR.

Timestamp: 1622201412 Timestamp [UTC]: 2021-05-28 11:30:12 Age [y:d:h:m:s]: 03:181:18:08:40
Block: 2370768 Fee (per_kB): 0.000013180000 (0.000006868356) Tx size: 1.9189 kB
Tx version: 2 No of confirmations: 918147 RingCT/type: yes/5
Extra: 01bee861a817c79e6a5988d73e1bd43ea1ca09c7ab2b4a42b2b136f7e26692a0c702090146cb1aff00f5de33

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 293dc04163a64ce0af4a96db454b960698fb9bca536d3ee2def7d4395dd18c02 ? 33083613 of 120139457 -
01: d41b3e936151b6f2fef378dfe61b09cfdc32a4e4a9b38bb7d1d593a7a1364036 ? 33083614 of 120139457 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: c3e4c3a721685702e803cdfe4f57d7c1c4b11219439a42b21c79ac9ebfee234a amount: ?
ring members blk
- 00: f8736bfc74ba7a5a556d09d983d811291692933fc324752c1b8a47d719e931b2 02366030
- 01: fef882ec8a519ae1550677a811d1ea76477a712e94d77b5c0efba6423c711021 02368028
- 02: a1b531ba83341306ab46b93a96373d2f8cdbe6e63613f49645c65dae441dd511 02369929
- 03: 2b177fa7675e20ec48e878a26f5d4fed29d8e3fb08448e2d020ad08cc3a371b7 02369959
- 04: 04d485ded8079ddbcfb87c4eff20810e8e19c4a267f15c900ebe52bceca0242c 02370316
- 05: 9290d4ebd0288c5366f884ff68ff2da8752e221a52d444bd274a73bdf27686ab 02370322
- 06: 89795c875f2d3639008679036d75df4f5b918e125bebf0b7d0a38f26045186cf 02370336
- 07: 3426bd26bc3005853291e4a7353371a0010967561b6c71a5848d756bb68af59d 02370494
- 08: 565261fae602e657550834abc056e24ab68a5fab84f0f3d6954a3c74b7a7c95b 02370613
- 09: 51bc288505f2af7b56e3f73fef54a741c08afa0321441430548ad8ecae79b7ff 02370656
- 10: 30667b939d15f14a7606c14d85af171d954b61fab3a6dec0dd0c06f2095cdb67 02370716
key image 01: a249055c6f022696e14f62aebb7f67027748d464edb81001a48660066499732b amount: ?
ring members blk
- 00: 137ff804f87972af66741c6564c141c575914246fb81ba066ea3557fd3f8d3f1 02232014
- 01: c8e754abc2303fa5fe19ea2837e5454a547299df7566353dfc143cef3fd4fb17 02354630
- 02: 897b04086791a3488d106163e5f63f4adbbfa2949f53fd71b395295d57e7741f 02365985
- 03: 405be970fb0da10a03217777321f36cc8b67c6d3d244df9fa875070c70167399 02367493
- 04: d6218d4aca404c9a35cd6d691576cda78f1a0f2557ba7f7d119a054139966b82 02368242
- 05: 8c5ee61397e10ae253fc2723c4d13ddb1631169b624358594f032061d5d5255c 02369551
- 06: 6f74c23a7aab55eb07919bdbc270701d99cab77c0f5622e13d5e2b4bbb6ba131 02369719
- 07: 27bee0e462900c88ce1af511ed75bfe06c7a1e6fbaa24ff671991a6fbc3101a8 02369972
- 08: 37c60fbdb7b5ea2158eb000985ad44d772a4428ee0e1fb3abcdb995ad3aad1af 02370198
- 09: 2c3904c70a44e12585ac94dcafb393088936fa26c21631eb3caebced34533e5d 02370224
- 10: bfbf398c4beab9ae541e6ebd4e9dfcc9895eb9212c19a747a7063f9f4b48ab9c 02370537
More details
source code | moneroexplorer