Monero Transaction 7ddb260d92e0f060e59899219bf414c8bed69a58ca94f32f626b5f99b644d2c7

Autorefresh is OFF

Tx hash: 7ddb260d92e0f060e59899219bf414c8bed69a58ca94f32f626b5f99b644d2c7

Tx public key: 045517c471a9f66aa7498024798b55814343c4662e94adb00af63fd7609a4193
Payment id: 45540df453b74b8dbc48a558cb2908f1a9b8d12aec214662a5adf43a54a8ded5

Transaction 7ddb260d92e0f060e59899219bf414c8bed69a58ca94f32f626b5f99b644d2c7 was carried out on the Monero network on 2016-09-12 18:07:59. The transaction has 2166369 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1473703679 Timestamp [UTC]: 2016-09-12 18:07:59 Age [y:d:h:m:s]: 08:092:04:18:15
Block: 1134528 Fee (per_kB): 0.100000000000 (0.068175765646) Tx size: 1.4668 kB
Tx version: 1 No of confirmations: 2166369 RingCT/type: no
Extra: 01045517c471a9f66aa7498024798b55814343c4662e94adb00af63fd7609a419302210045540df453b74b8dbc48a558cb2908f1a9b8d12aec214662a5adf43a54a8ded5de206f3a4d5170a50fa4d3484973d4fa6ed0e70d0c57f46d01740fa8137571c1ef57

5 output(s) for total of 5.498000000000 xmr

stealth address amount amount idx tag
00: b52ae915e47b1514179dbc485576852e7837005df0dc166649de0bbb599fc5b1 0.008000000000 205866 of 245068 -
01: 889ebcb63d762795ae94794aec35e7634121d299bb3f3d6287627a58fed51b96 0.090000000000 254732 of 317822 -
02: 4ef386fd8771b632ea49bf9d587b13895e0ba41958cfee1ae496a45028b87ead 0.500000000000 1043257 of 1118624 -
03: 24b4a1975f91a680ab7af567aef729176eef1a3f4c43c046800e5a529c98a46e 0.900000000000 397132 of 454894 -
04: 54b0c3cbd2c8c2d6b8438198274df48e7a4cc14bbf4472e537591b2242113a25 4.000000000000 212179 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 5.598000000000 xmr

key image 00: 1aeab08bb8f15d740ad79a3f5720efac0a99cf7882f1ac8bd1628fd89d4bf906 amount: 0.060000000000
ring members blk
- 00: 2f6007c7a6314078ddb19065f94b4c30ad2eb43ea2de5e330f26c73685805900 00007483
- 01: 53136345abe9e712b8b9f430d78b04c1377e9deec4bba2d5aa298ad8d4d996d6 00071434
- 02: b11b1a2f8e4a9d0eb1d22fdf66b877dfd5efe5cab74aac6cf36f8ca525b7d5a9 01134398
key image 01: f086bbb2fa726652e88827420c83fbfed3e5f3487842bb0019fb9cf73802f547 amount: 0.008000000000
ring members blk
- 00: 46e980a9738b2eb869efc4772de4ff476568b4f756f888680be905a0b25e5cd5 00085450
- 01: 6fbe5591a873595dbf4381a17aa7838fd59becc8eb092c5cf4b3981946f62e2b 00086639
- 02: 5fac00cb58dc7d9cc79304aee6fb0a11ba76c2d3b6b50f811007d3e5de000e86 01134508
key image 02: b092992715c18cf65a869ad68a64877183bc7d3a23da139440657005c918d687 amount: 0.030000000000
ring members blk
- 00: 6203b45595ecd305f34900c2e00325549f6a709e7ccf1899df2175144cffb5f9 00077480
- 01: c697b79146448e10cdb58d20c6dfc73a3a36ea239ea36b8a524f7becb82ee20b 00101363
- 02: 2c10946a51721d927e5c53b45e71d3ec6250033b6d920c5dba148a3c86754b5b 01134356
key image 03: b30a7a3635c658d46876b2169e890107d83c07effc82ad2eeb20c2cb31a709f5 amount: 0.500000000000
ring members blk
- 00: 5c3ddc40b4f1abf3850f0f9766df1c38d1a6e95ac3d18b051af1379f5c3f2cfd 00181651
- 01: 81ab4653f0a67bbaddbf757cd240816ad1491cc07017a4ff7ce04b64de05733c 00196371
- 02: 3a805658ed652e84bfb2781d2cdda887beb39117547a636900aeed7fa8405b29 01134364
key image 04: 0411d84af102230272e2313201d668e1e693652e730e94d94baca0e94ea0e689 amount: 5.000000000000
ring members blk
- 00: d42b205685f8a82881720c651f3a0c24ce0e608008e950a30969690640b2ce7e 00849312
- 01: 40a56fc876f7f22ac6c32ddb58719726de8b408edb434266bf8cbd7d79b05fa5 01124205
- 02: 0c305a08cf6fafba3f17f644b1f00ee3097be42d5ded445b7e93998e6730cc77 01134422
More details
source code | moneroexplorer