Monero Transaction 66f19f8a84264ff0d9f2194d533673cd56c8b5eb04dd251dafa3a8c4ceb67325

Autorefresh is OFF

Tx hash: 66f19f8a84264ff0d9f2194d533673cd56c8b5eb04dd251dafa3a8c4ceb67325

Tx public key: 743575959f9ead7073e19b627f7eea30a21944b5ca92d55affae85b42068b797
Payment id: fe66f3145da5af6c6846fbe2587e210d1d8cb0d1c5063a99cce272bbeb40da13

Transaction 66f19f8a84264ff0d9f2194d533673cd56c8b5eb04dd251dafa3a8c4ceb67325 was carried out on the Monero network on 2016-11-03 03:12:12. The transaction has 2115373 confirmations. Total output fee is 0.005586700000 XMR.

Timestamp: 1478142732 Timestamp [UTC]: 2016-11-03 03:12:12 Age [y:d:h:m:s]: 08:020:23:04:18
Block: 1171281 Fee (per_kB): 0.005586700000 (0.007036630750) Tx size: 0.7939 kB
Tx version: 1 No of confirmations: 2115373 RingCT/type: no
Extra: 022100fe66f3145da5af6c6846fbe2587e210d1d8cb0d1c5063a99cce272bbeb40da1301743575959f9ead7073e19b627f7eea30a21944b5ca92d55affae85b42068b797

13 output(s) for total of 199.994413300000 xmr

stealth address amount amount idx tag
00: 6b85c51b398bd42813b48f1017b736dea8222ad992800d8dadfd8d5fd06d63be 0.000000300000 10694 of 22748 -
01: eccbb4c280c77906d1ca6d843086462b67c4ada7e1dff8e2cd061c0c0ccdf502 0.000003000000 30125 of 42341 -
02: d8cbd9d97db0336b8be2bcdf3d932b15e267cd19bfd50f3318884db1d14adda6 0.000010000000 47181 of 59775 -
03: 31f92b48889558d1874194531c5001d5cc132fe53a254daea6760336bac939b5 0.000400000000 60232 of 77134 -
04: b581173d573dbe266e1165d47da7a038f349be2988d6f2c32100325c43cdee84 0.004000000000 63480 of 89181 -
05: 84d19cf8abba5120e6a17741e6a3dbe07cbe7bc8138812c65f0f6286903c1a0b 0.020000000000 353514 of 381492 -
06: 66a717dd89c1123c73841eca2ccfafd20f8dd81987df70082f437b7ab249d189 0.070000000000 235857 of 263947 -
07: 7c1f3bf975885a00846ee7e6468f3491f8c5e073f0849067d53eadfa176705a8 0.300000000000 909220 of 976536 -
08: 2af93b6ea8549add7724fe9ed983f80327c27d74ef619c7e401d373bd0b4dba3 0.600000000000 618635 of 650760 -
09: 62f821d4104ba9d7a78705d7319af4a57d61d1c65d4e0cd493c9ffd919b143c5 4.000000000000 221262 of 237197 -
10: 12b5b709ce419e5d8d847dbbb472ba94b95f169c19c8d6d894dccf4ae341df02 5.000000000000 236727 of 255089 -
11: f99eb3dd7b6fe113c92c77fc846b8829a54b1967ca6a4f5d8a599788e263f834 90.000000000000 30402 of 36286 -
12: f40b32b78acc0ff71c8ded3807054b0eb5967779b3753a681161e7f774a9e711 100.000000000000 49502 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 200.000000000000 xmr

key image 00: 5eb288df6c85ab543ad12511d58c956f8a85cd0c97fd97f103ceadb140b3d8aa amount: 200.000000000000
ring members blk
- 00: 8689a3dff7b102a02980c065483cf4ca7a5f395eaeefc69c6ee762f850d66f4a 01037886
- 01: 2c8e1b05072f6e29b1deac5b46e1c2a7b95cfaa072a823b545546b60bb7ce364 01079837
- 02: 00b9bbe5f752261caf657f23934febb4eb4fc2a40ba043c7a5c2e8ed367424b2 01171189
More details
source code | moneroexplorer