Monero Transaction 799fd29057c8474627dda24e9fba04454ce8d9f58cc9e088dba1da597a22a168

Autorefresh is OFF

Tx hash: 799fd29057c8474627dda24e9fba04454ce8d9f58cc9e088dba1da597a22a168

Tx public key: 5befefda7869667f1da5b3aa9fd453634d66541bcc284613160599ec296c51e3

Transaction 799fd29057c8474627dda24e9fba04454ce8d9f58cc9e088dba1da597a22a168 was carried out on the Monero network on 2014-06-14 06:05:58. The transaction has 3219332 confirmations. Total output fee is 0.005290000000 XMR.

Timestamp: 1402725958 Timestamp [UTC]: 2014-06-14 06:05:58 Age [y:d:h:m:s]: 10:187:19:07:47
Block: 84504 Fee (per_kB): 0.005290000000 (0.007193837981) Tx size: 0.7354 kB
Tx version: 1 No of confirmations: 3219332 RingCT/type: no
Extra: 015befefda7869667f1da5b3aa9fd453634d66541bcc284613160599ec296c51e3

16 output(s) for total of 2.994710000000 xmr

stealth address amount amount idx tag
00: 5142d47f1b521eb9e5d19a05313fd960c5e74899606fdc4e9c2aa64621f27702 0.000010000000 34554 of 59775 -
01: 71acffa53ba81a122c251d528f344a448bc6d8f83d314fa7a0eb60e814777cb0 0.000240000000 1661 of 2167 -
02: 7bcd3fe36c2b16278dbb29b8bc0c0b28b1d230c7de5426b92f8e8b0adab409d7 0.000640000000 1674 of 2201 -
03: 5f8079d48dce6c75fe10d88ada36a47b88c6efb97f3b49ee6b2c6f2ec0f9414e 0.000640000000 1675 of 2201 -
04: 0d3360a977aa10bb1f0bf44bd448253a78ab5794f27aa3befdc21eaa7892b90f 0.001970000000 335 of 435 -
05: 359faf2f8ad7f45d72d1e225652b9579ebe6756ec69590221fe725c14fb1d61e 0.002480000000 348 of 440 -
06: d5e86b6ccd0f2d456d39e7fbf7e4efc1e43e6a4767e20de6c9e015767bee0d70 0.002960000000 291 of 379 -
07: f18ed79c4f94c5d342504d33f42ad60726ee3a62d388498572b230ebc9c198d8 0.003510000000 305 of 378 -
08: 00b7dcaee5110c35d80c2b536eb5784a2b792a510d0c1da6484c4288b4aedb30 0.003900000000 287 of 388 -
09: 8e332a2a9b7c3af4cf83e5b6f7abd833182920822e97325aba0a70007bc38e8a 0.004360000000 284 of 358 -
10: 7e957eb14faf874036438b1de6a382b2e4aad36c8ec302b676ead8e315c65b77 0.006000000000 111381 of 256624 -
11: 4eaff7df1d74bc4a9deb15b42972ae690478bc3f874cd699a298f64826233343 0.008000000000 100466 of 245068 -
12: cef440ff8a97cc01ce2f2d67c3d3a2497fce77c332253d21bc1fc0af742305bb 0.010000000000 208657 of 502466 -
13: 75598135500721eebc7f91a4acddced5c3ffa7c233b56d50ecac6e8a6b350269 0.050000000000 63887 of 284522 -
14: ed1a1af635157dd5e1486a37b62bfc8b940d50049e2fdd2d3c1806c58e4c96ee 0.900000000000 17372 of 454894 -
15: 2101cb961e06a73a0b3eb80a95105b956a69b752a52b0e8d552f47a0bf102212 2.000000000000 11446 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 3.000000000000 xmr

key image 00: 0ef84071ff8f42d4e57a5d60bfeae07875a8ce7daf3541b60ed831237e971080 amount: 3.000000000000
ring members blk
- 00: 4c3d7e6d12c767565ca77ecf9f5be8cc5ec7fe84b82b96ffb0f192e3280c8efa 00083296
More details
source code | moneroexplorer