Monero Transaction 96bfe6def1374c7fb005365b2e705d8b8c3fd3106b8d7d6981b7015c116c811a

Autorefresh is OFF

Tx hash: 96bfe6def1374c7fb005365b2e705d8b8c3fd3106b8d7d6981b7015c116c811a

Tx public key: 3c061b8eb6f86dc580321777f7be5e868fc84e1c2f493f55a9a3e5f384a4e9ac
Payment id: 585834c0ff57930dc04b6467fdbc8eeff426c4abf07f94e2b530db5eca8d8c56

Transaction 96bfe6def1374c7fb005365b2e705d8b8c3fd3106b8d7d6981b7015c116c811a was carried out on the Monero network on 2014-07-31 00:59:44. The transaction has 3126185 confirmations. Total output fee is 0.007535421517 XMR.

Timestamp: 1406768384 Timestamp [UTC]: 2014-07-31 00:59:44 Age [y:d:h:m:s]: 10:105:12:12:26
Block: 152164 Fee (per_kB): 0.007535421517 (0.008798485329) Tx size: 0.8564 kB
Tx version: 1 No of confirmations: 3126185 RingCT/type: no
Extra: 022100585834c0ff57930dc04b6467fdbc8eeff426c4abf07f94e2b530db5eca8d8c56013c061b8eb6f86dc580321777f7be5e868fc84e1c2f493f55a9a3e5f384a4e9ac

7 output(s) for total of 9.332464578483 xmr

stealth address amount amount idx tag
00: 5212032d7c74fb7463f3a21d1625ec1947e6d5ef9fa43217ae0707a6d964ba4d 0.002464578483 0 of 1 -
01: 53b7f7c2062bf5b13c8c630607f33a0e5a4c978c072504e6e044d37eca905e11 0.010000000000 321266 of 502466 -
02: 0906f260f5c1b684a61cbc81259d8b742dfb0247c5a45a53389e0c1b39cc2dbe 0.020000000000 206286 of 381491 -
03: 926504daf477d33d8f2779492b82c269991efc9c4e44f5c7dad6f746225405af 0.400000000000 124221 of 688584 -
04: bb7b3d29d6f0b593459f4758554e8c196302707ad87be99d2944d5e8267a919e 0.900000000000 71121 of 454894 -
05: 04f84322504969b0819bc8760ba23d3ffe0e820c222431384d25ca6b1a7fef5f 3.000000000000 37505 of 300495 -
06: 06f048fb24627c639377e612b6d4175e30d19eba6961de7fdf6737b4068f30c8 5.000000000000 80659 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 9.340000000000 xmr

key image 00: 96b75d7c56f23b6bd7db4f5a6c6d3417c2b55ae85dda55797538cabd9b86a363 amount: 0.400000000000
ring members blk
- 00: 2aa2304177f33f594d6b4030a7a05ae1b2c623d8e0b641dcf5483bac6f2ef2c7 00150811
key image 01: 19e94b480a0a48c27828e987fc745d1e8a60cd1b804e57e17d8fcf6005c1b98c amount: 0.900000000000
ring members blk
- 00: 3d05185a827c8bb53a3adbbb06d0ce2532f14b1f4071690eaa1fcec86aa8785f 00150349
key image 02: 88bbcf53d38e16ff2b91453471de78962065d509c2acaf487c0816c92aedaf50 amount: 0.010000000000
ring members blk
- 00: 06de434a5cd19b962e39b4d585bf8409ff7f116fef5d84fb2a1f11127a7c029e 00147527
key image 03: 9047e63d7840f3b6fc8a15d4dc87b02d25c27ae2835a3f072f103aa2b7da6a74 amount: 0.030000000000
ring members blk
- 00: 807637ad2aa92f8b91f55ec8c4900852e52b27c10b21f1b42a075ba531fdd164 00151472
key image 04: fa670f33084637584bc27330820e86e63d08a3cfe004043171909714a9a06426 amount: 8.000000000000
ring members blk
- 00: 01c5b3665d9c4d806e298bd565f89c54da14ad50d7a367b99c61a06dcdedda94 00150842
More details
source code | moneroexplorer