Monero Transaction 66bbf8a8a842ad5818ccc8b1a594c4386f396464cac1030635d3b4c110fe2f90

Autorefresh is OFF

Tx hash: 66bbf8a8a842ad5818ccc8b1a594c4386f396464cac1030635d3b4c110fe2f90

Tx public key: 679e5d71d45671041583b90f8fa3cd384d21bc74c4b6c36cf1bb4900bb0ac693
Payment id: fbb1945dd5afe60c2c70ea9e7e6bf751f5b136fa356e823a70c81de1faad312f

Transaction 66bbf8a8a842ad5818ccc8b1a594c4386f396464cac1030635d3b4c110fe2f90 was carried out on the Monero network on 2016-09-03 08:03:48. The transaction has 2162171 confirmations. Total output fee is 0.112704400000 XMR.

Timestamp: 1472889828 Timestamp [UTC]: 2016-09-03 08:03:48 Age [y:d:h:m:s]: 08:086:03:22:27
Block: 1127614 Fee (per_kB): 0.112704400000 (0.105396626119) Tx size: 1.0693 kB
Tx version: 1 No of confirmations: 2162171 RingCT/type: no
Extra: 022100fbb1945dd5afe60c2c70ea9e7e6bf751f5b136fa356e823a70c81de1faad312f01679e5d71d45671041583b90f8fa3cd384d21bc74c4b6c36cf1bb4900bb0ac693

14 output(s) for total of 800.487295600000 xmr

stealth address amount amount idx tag
00: c651133ff9a954abb512e8aa2375b19b189415082bdc749e8cd19ca5a7f60baa 0.000000600000 5666 of 22710 -
01: 383ee767633bb6172a44a2b5e89fe61f8079f43fd1dedaccfb0ccfac3ac80921 0.000005000000 24833 of 42488 -
02: f27458418b88cba96fed9fdbf8f565aed454800122957f06057d2cb3cc108cf0 0.000090000000 43112 of 61123 -
03: e098621e29252e12176ed968baad1dc31b9f3bf1d9b1fa1e3cf6b3dc9db45533 0.000200000000 51166 of 78038 -
04: 69031baab4205c5497744f7ce50c30f12ac6c32b782e376c71a8012564a50f90 0.007000000000 211362 of 247340 -
05: 3c99ae46dd59686aaa3a7cb427fc612072bf95a65bd8b3841d2d6d4a51bc9fbd 0.080000000000 221256 of 269576 -
06: 5651b285c328f884873f62b809d0260f6c034e01f17a50ede237db9130a20ef3 0.600000000000 596727 of 650760 -
07: a9a2ed4e76f3ab908dd200474553490beff2ff5be5e85cf5affd8c0f6517ccd9 0.800000000000 438752 of 489955 -
08: 8a9337cc01858ee51bd612b4aa883b352a8a6e8694431b1ffcc7d39fce612358 3.000000000000 269402 of 300495 -
09: ad4b811106ca3fb53183fe67ea9bd3854dda20f4a6bc9bd4b482057e284a197b 6.000000000000 184844 of 207703 -
10: 9acaf93a72d8bb7cea467a6aa9df520e45672de936c17c062f1b0a95037916ef 40.000000000000 31847 of 41682 -
11: c5ac0e9740a493208986e4c4593ea6abecb29d7b81076282fe29bf80770d22b0 50.000000000000 33394 of 44703 -
12: 2536836c28b001dd54eea91eab87aba9f9cd1f76c89957221fbcdb4a7f8e4948 300.000000000000 11630 of 16700 -
13: c89c45d4bc41d53a293c41fba7baa1b144b3b433681650a0477c4e0c0cf084cc 400.000000000000 9768 of 13353 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 800.600000000000 xmr

key image 00: 70cb3cbb45e35d8561bcd7542bce899c5d1f1f4db2c32876a67c093d1b34db37 amount: 0.600000000000
ring members blk
- 00: 1b4b9beb1f5374400500c87f26fb4b952205d8bbda6c48b4ae09e801fc8ad9bd 00330010
- 01: edbcecb2f2f79bf998224267731833df432889d86da36bbe9284c9fb20658158 00433505
- 02: 0e736cb9a3020edafc222e29f0075d667d775c41abaef214f16fb74bf62baec0 01063323
key image 01: 47ddca8ff8be8021197225f4046a84637e094ce089d31fb03aacb0035a197859 amount: 800.000000000000
ring members blk
- 00: b2bffa5075ef39ad2a5f3d2119696928f627705246bc080218a2266401d1e568 00953823
- 01: ce2210719c13fe5d64ae6b59204a4b50fdaa398372b3f3fa287f982788d76f95 00989032
- 02: 76bd56a2fe0e6484445f0544a7f41aa886ab720a983ac32cd5640d30666acf9b 01124085
More details
source code | moneroexplorer