Monero Transaction 71e77db6676b0ac4af8f583168f8fdc3c83fe0d874cb32d901fff7f7fb8bfb4b

Autorefresh is OFF

Tx hash: 71e77db6676b0ac4af8f583168f8fdc3c83fe0d874cb32d901fff7f7fb8bfb4b

Tx public key: 66e3acbae099078f9c5b68b8a7fcf5a6e7dff4cee69b52397d384b35a0309849
Payment id: 16bd9ae5b8067cd5bfdd6e1054611d44df016f58876f29e6b3f2210cca7f4a5c

Transaction 71e77db6676b0ac4af8f583168f8fdc3c83fe0d874cb32d901fff7f7fb8bfb4b was carried out on the Monero network on 2014-08-20 20:49:16. The transaction has 3175058 confirmations. Total output fee is 0.005792535954 XMR.

Timestamp: 1408567756 Timestamp [UTC]: 2014-08-20 20:49:16 Age [y:d:h:m:s]: 10:194:02:13:57
Block: 182036 Fee (per_kB): 0.005792535954 (0.014327431925) Tx size: 0.4043 kB
Tx version: 1 No of confirmations: 3175058 RingCT/type: no
Extra: 02210016bd9ae5b8067cd5bfdd6e1054611d44df016f58876f29e6b3f2210cca7f4a5c0166e3acbae099078f9c5b68b8a7fcf5a6e7dff4cee69b52397d384b35a0309849

6 output(s) for total of 9.994207464046 xmr

stealth address amount amount idx tag
00: 2d061b642105207ea36bd1902952d2bfebab475956452026288ffb7da1345fc7 0.004207464046 0 of 1 -
01: df1a137be5f6c2b4ed2542ceefde86c6d2bb5109e7a80b57f3aa0f9e2cfc623a 0.020000000000 220341 of 381492 -
02: cba2acf559559daeefae6544e97ddd1c1cec521552dd8754e9f3c5d850b04684 0.070000000000 99922 of 263947 -
03: e61d6887170c3ce0885b3f6f5f86f636212c1b0b20b51b699b5972fa45e0bc83 0.300000000000 173335 of 976536 -
04: b07f59b14f5b90ad01eb41ec3d977c7477ac8091c8d627adf5c0a3a3ed4f4b3d 0.600000000000 158690 of 650760 -
05: d15c431812a0e47411786fa22fab8249dd32112a727a5ebc39978731ebeaba22 9.000000000000 16927 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 10.000000000000 xmr

key image 00: 4802baf70734a5dd03a5360a228695cdb9cef457776044838eb05de4b704420e amount: 10.000000000000
ring members blk
- 00: 5e8f103b9f980cfcd669ba06aae2562e4f114f0923222592e4847b024c2722b4 00181799
More details
source code | moneroexplorer