Monero Transaction 66dcb211f7778d796cf02838d2b52f23d767ab63a50893e04900538eeaf7ebbe

Autorefresh is OFF

Tx hash: 66dcb211f7778d796cf02838d2b52f23d767ab63a50893e04900538eeaf7ebbe

Tx public key: 44bbd14df971dca0afb7ceb6487cba4a968454c3fa68732d28e043081e4d8013
Payment id: f9691f47d5f78fc8ff2af2d1f78599b3f0bf5806e6831e3385bdc7c8ff303931

Transaction 66dcb211f7778d796cf02838d2b52f23d767ab63a50893e04900538eeaf7ebbe was carried out on the Monero network on 2014-06-16 14:21:21. The transaction has 3190490 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1402928481 Timestamp [UTC]: 2014-06-16 14:21:21 Age [y:d:h:m:s]: 10:150:02:07:52
Block: 87959 Fee (per_kB): 0.000001000000 (0.000002515971) Tx size: 0.3975 kB
Tx version: 1 No of confirmations: 3190490 RingCT/type: no
Extra: 022100f9691f47d5f78fc8ff2af2d1f78599b3f0bf5806e6831e3385bdc7c8ff3039310144bbd14df971dca0afb7ceb6487cba4a968454c3fa68732d28e043081e4d8013

6 output(s) for total of 0.069999000000 xmr

stealth address amount amount idx tag
00: 58852b9d6505f6d217330ca1661d9c8af7ea646e1e0171767b4868e58a4b2e96 0.000009000000 21892 of 46395 -
01: e5459b6121bfe55f096dea7e62eecb65a1b0290299cd380e0c3b0bc184ea7993 0.000090000000 35949 of 61123 -
02: 41374a2fce8011752e88929a2caac099ced594ebbaca409e0fa7dcabbf6c4f24 0.000900000000 35424 of 81915 -
03: 04aa640758d618d2c6c4de4a8de4a9b1beb9218c88906b638444c3f6c6054abf 0.009000000000 117604 of 233398 -
04: 44e195d1ea86aa79cec3f2ced147bcdab41ee4b572f5d48d34126ac284dfea6d 0.010000000000 256405 of 502466 -
05: 98de7697948a80501ca1f77b936c7db19eee8b739888b14d6c6295bd81761f32 0.050000000000 77101 of 284521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 0.070000000000 xmr

key image 00: 17f1b28daaa660a8b8b4957b2a455f1ae178257b73dc608722bb279e190548c0 amount: 0.070000000000
ring members blk
- 00: 2b0b99a8d254505d0b4ac7191cc67d5696b774bb09afa892da88a0c5d048bc9b 00087915
More details
source code | moneroexplorer