Monero Transaction 66d3de9d8b8bb6db301b04733c6379a6285105db72703e34e7907ad66b8dda59

Autorefresh is OFF

Tx hash: 66d3de9d8b8bb6db301b04733c6379a6285105db72703e34e7907ad66b8dda59

Tx public key: 54e5c49c7cd5a940bac22efc67f197beaba8b98c9d979b999cb8773561f3d569
Payment id: cb5ea9c3e30282103787abee7d9cbb9d61e0b0d2bed54ae444de1ed89a714542

Transaction 66d3de9d8b8bb6db301b04733c6379a6285105db72703e34e7907ad66b8dda59 was carried out on the Monero network on 2014-09-02 09:46:38. The transaction has 3111900 confirmations. Total output fee is 0.005600000000 XMR.

Timestamp: 1409651198 Timestamp [UTC]: 2014-09-02 09:46:38 Age [y:d:h:m:s]: 10:119:00:09:20
Block: 200133 Fee (per_kB): 0.005600000000 (0.002643798986) Tx size: 2.1182 kB
Tx version: 1 No of confirmations: 3111900 RingCT/type: no
Extra: 022100cb5ea9c3e30282103787abee7d9cbb9d61e0b0d2bed54ae444de1ed89a7145420154e5c49c7cd5a940bac22efc67f197beaba8b98c9d979b999cb8773561f3d569

2 output(s) for total of 2.700000000000 xmr

stealth address amount amount idx tag
00: b5e143e2fa3e1510989f1621ffe3f0359f7b27f2c0c055e7a2934b7fa61ed3f0 0.700000000000 134699 of 514467 -
01: a504cb922949a87103039e32cc3200cf37fe7244f4a341d709ff47b8cb39bb70 2.000000000000 89850 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



19 inputs(s) for total of 2.000940000000 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 2a884d9ed3a4813dcf1faa8e3ca5db1017bb82e3bc572f59c009778a86129f9a amount: 0.000940000000
ring members blk
- 00: a22a69c2e03cdbc443712b86221e6f2a1b739e520a7fd1a9827c26acee45f594 00071119
key image 01: 26ae651395543327b4312d9e15e265c6c49d052e39b401df761509fe6edb896e amount: 0.200000000000
ring members blk
- 00: 46029ff82cb4646a93b9b9e47970152f52b297b8d9f99f9ba3620fa9bcbd2c24 00198219
key image 02: d53c454317f52bc03cd4cab6562da7bd6d1f44ff310fcf9a4103b44f1e5a9af0 amount: 0.200000000000
ring members blk
- 00: a16c62764999595321c19266a61f1b5a96f081580e24a2b9a608c36048c830c9 00198787
key image 03: f2a82da3ba9348a14f412b2d4feec104b2eef98b4e6469abbb5e3054e77cfebe amount: 0.200000000000
ring members blk
- 00: 85c8be26a320ee884a9ca19e17cce1a08fae8212c4b1cc3f11467941eb78f50f 00198116
key image 04: f555ca67cb4a1fa5773bb8766f9474022339dc62fff1e3e88d21216d5bb725b9 amount: 0.200000000000
ring members blk
- 00: 014f86fedfe35d07ae56025b507d48cae7327adea3eb9954b1a3f547f0c2352f 00198965
key image 05: a022e24a70032ae16a940c74885415291f00e2fffd82e85bcb41fb2ec1ee9fa1 amount: 0.200000000000
ring members blk
- 00: 5b621e213d1ce23d7c8e250dde49e2dce66577b68ca2f6d5d6102ea7feeaab76 00199262
key image 06: 929b75572903d0450a39c0f6439378d68d1b5fe179b3dfb2204cbfb4b4c46ca5 amount: 0.200000000000
ring members blk
- 00: 9cdb61d843feb5ee5ecf794b5530fded3c4fd2e44944bc545d1eb9f59e2fcedb 00197982
key image 07: debc26d06409a903d3ea9b4a882f3e1a5df3bc203348e05def90a05ca2130443 amount: 0.200000000000
ring members blk
- 00: 7a39a818d5f6e6d8226d0256e7966b6d1f2c34c25b3e1c9b255058eb5d3e7fdf 00199450
key image 08: a57b575c94fac0dd688be8dde592cce78a7bb8f3bf6b7d3b631cfa552eaad8ee amount: 0.200000000000
ring members blk
- 00: a976ec8b1eba829155966ae068945a27431cdef92cdea7e3b194e36744a9c833 00199340
key image 09: 0662c3bcc7f2506a1977d95acc84858221e87af732ffcd2a04151523d6dfe4ec amount: 0.200000000000
ring members blk
- 00: 49d0d33a9a799f878b78e28026b2646ed856eaebe8875051226f2e333a268740 00198321
key image 10: c851a8fb92d2cd5f3c54e0eb66c54fba0db2c3f0fa7910a86a0e2cc8fc9f2d95 amount: 0.200000000000
ring members blk
- 00: f391ce4d4146ad31ff4842282fb6dac4769469c5846a57cbf2a707a72889854a 00198661
More details
source code | moneroexplorer