Monero Transaction 66fd38a713edcce35a2cf8e4020cae189671e21a587017ef517247df38fc2c36

Autorefresh is ON (10 s)

Tx hash: 66fd38a713edcce35a2cf8e4020cae189671e21a587017ef517247df38fc2c36

Tx public key: 83f8dc96677d2c5b469aee903cb00ac3108d0b7db3b6b9ce5843762451d08ad9
Payment id: e10973901cc247fab4017d5f55163af51093e967fd2944f997f3be4bbf48e059

Transaction 66fd38a713edcce35a2cf8e4020cae189671e21a587017ef517247df38fc2c36 was carried out on the Monero network on 2014-06-23 15:34:32. The transaction has 3180041 confirmations. Total output fee is 0.007617781512 XMR.

Timestamp: 1403537672 Timestamp [UTC]: 2014-06-23 15:34:32 Age [y:d:h:m:s]: 10:142:20:30:15
Block: 98271 Fee (per_kB): 0.007617781512 (0.001702446152) Tx size: 4.4746 kB
Tx version: 1 No of confirmations: 3180041 RingCT/type: no
Extra: 022100e10973901cc247fab4017d5f55163af51093e967fd2944f997f3be4bbf48e0590183f8dc96677d2c5b469aee903cb00ac3108d0b7db3b6b9ce5843762451d08ad9

1 output(s) for total of 2.000000000000 xmr

stealth address amount amount idx tag
00: b2231251b212694c8263a65949b2b2bee3d146f4a5785c7a7f4c7f6103bc38a5 2.000000000000 19625 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



42 inputs(s) for total of 0.506617781512 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 2bad9e919eae26b6aff70e2fbf68aef25031522a445f6155274333a2ce8c0e55 amount: 0.000617781512
ring members blk
- 00: 41a95b4df5305563195ae89ed5d5f48ad8a78ff6c8f3d47adc0549a66e23382c 00096359
key image 01: adff5f1bd537c171f0e10230f29a9a9f0d2106d70eb9c87b9d53a267db0e2c8d amount: 0.100000000000
ring members blk
- 00: c3edb3d2c4e2c41e01237269610a4603c5ece11a7ac3d39cdc490b8abd437a14 00097420
key image 02: d32c0780bb04e8bd6a9cdf57f62232a18ccec1e4b86646d77d5aebc032d2d525 amount: 0.010000000000
ring members blk
- 00: e37dbdcaf848edecd41506c3cf84a40939831c1e40f46094a339ce0028ee5f87 00096987
key image 03: fce80377f3aee60d71e69d7ad8f69bfa650b7d1cf7ddd3914259b71b02e1e09e amount: 0.030000000000
ring members blk
- 00: 5b2690f77ca3ec33c4291f40546dcde7c93d7ab36e20817cad46351eae5dd72a 00096852
key image 04: 93b5d4b2d772400484cce9cbc3298d1ca07ad7fabf57931c00e140705dac2153 amount: 0.006000000000
ring members blk
- 00: 7803fa69881796cfbe2d4925467bbdc1c66b47415564c7a0d5db94949bef5691 00095774
key image 05: 8b8e91a8e9ba45dc29d84a0684a8ad6030e7c958f70b0e1ef12ddaa6e8eb8bf9 amount: 0.040000000000
ring members blk
- 00: 72f4c7cd9ae674a6a1be613dc2ea6ae02714d8e0df42ccf67c2e6695895bf00f 00095691
key image 06: 68813af3c6916d1cd31545ee9c49a4a7976acc708cd0947616660b4dcdff38a4 amount: 0.080000000000
ring members blk
- 00: c4cfedb6d8171e3867974aa8d32f48834d783ea8ffab5602afbce27869604035 00095650
key image 07: 8db019c71693c187b724b027460a19b7fca140fede91bbc0c91113e51470639a amount: 0.100000000000
ring members blk
- 00: b6c3a694092ee7ec4f26e2f0e51206656cf149866efafb7f5eed11eb5ec81a8b 00097916
key image 08: 0fae78fbe86cb5e531d8d6893b03dd05ccd87eb075cbe6c1b8c55ccf90898c9d amount: 0.090000000000
ring members blk
- 00: 9fd9864d7a88dfefb7d80e6201ef2655f1214468c5e0a600b81d5b2b1527ad8e 00096905
key image 09: 603caf1630b1b23a9294627a5de4767d85fa1918cf700f0fe9b5a2dc933f9ec1 amount: 0.020000000000
ring members blk
- 00: 1056b21eece8669864971debaaf7d5b5dd0f67ddd1214b47222cc3a5b2f05b41 00096054
key image 10: afbaebb60006c3181c0f09588a323ad28109ff6d80705fada0441caf6c623cf5 amount: 0.030000000000
ring members blk
- 00: 216d2614c58205cc3e27a007853b336063db3434e55269d90adba65169d33e66 00096662
More details
source code | moneroexplorer