Monero Transaction 71fdf50a3400c4d4adec244e152e590eaa41a0acf582759aff9bc9470ed63cbf

Autorefresh is OFF

Tx hash: 71fdf50a3400c4d4adec244e152e590eaa41a0acf582759aff9bc9470ed63cbf

Tx public key: 350d6bd80ed33dcf80365cfea74d5ac4e7212e9557a830516a36d34273572709
Payment id: ee6be3769cc9889aeeb859a18a36248ac728bd2c1a6c8b2dbbcda93a5afa31f3

Transaction 71fdf50a3400c4d4adec244e152e590eaa41a0acf582759aff9bc9470ed63cbf was carried out on the Monero network on 2014-08-23 07:29:07. The transaction has 3103419 confirmations. Total output fee is 0.006561670000 XMR.

Timestamp: 1408778947 Timestamp [UTC]: 2014-08-23 07:29:07 Age [y:d:h:m:s]: 10:097:00:55:34
Block: 185590 Fee (per_kB): 0.006561670000 (0.013940145394) Tx size: 0.4707 kB
Tx version: 1 No of confirmations: 3103419 RingCT/type: no
Extra: 022100ee6be3769cc9889aeeb859a18a36248ac728bd2c1a6c8b2dbbcda93a5afa31f301350d6bd80ed33dcf80365cfea74d5ac4e7212e9557a830516a36d34273572709

6 output(s) for total of 9.993438330000 xmr

stealth address amount amount idx tag
00: bf4140202b66d99e5cfbf0a88d4617f5497b8e0bba0d360000e6a7131e7ad832 0.003438330000 0 of 2 -
01: 8533d5d5909723406685b992d833f1fbe46f415ee5dee7fe92b1b078af28af65 0.090000000000 112119 of 317822 -
02: 4304830e021fc42316db67f96248548befd9412da583ba4418632311f796c819 0.100000000000 469915 of 982315 -
03: 0d122e8b8d08d2ff8c84f587dc7c2b9c1554bda74bdc4ad63cc729eb637e3675 0.800000000000 131026 of 489955 -
04: f8617bd3b78385fc71fe33176fdd53a74ff9a24f94b495c5bf823b68bb65166e 4.000000000000 54904 of 237197 -
05: 94441d6679471eab40b52534a2adca53b28edb626080aaeabb9f1520522d3e7a 5.000000000000 107229 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 10.000000000000 xmr

key image 00: 4f7d7fedb7ab9b7259373598112379c783747054ca15f30d161dfbafb36d9bf7 amount: 10.000000000000
ring members blk
- 00: 880561b9eacb01fe135291bb15b5d2bcce7f90cec4068811c2d7b8543ff39336 00071062
- 01: 5b33f50b550a0f9ae9f9b8a57193c77273d7ec33a4934a3a17efbb4ea69652db 00185471
More details
source code | moneroexplorer