Monero Transaction 970dd5dd17bbd59d28a41a647df174687f88ebcd18f8f416fd1b55325954427e

Autorefresh is ON (10 s)

Tx hash: 970dd5dd17bbd59d28a41a647df174687f88ebcd18f8f416fd1b55325954427e

Tx public key: bbc599b9bf8bb7ded116b644e991a258836a5fc8b3e627a66aa1c64895ec22ad
Payment id: d5959039cabbedccd08892b5991554cffb174bb2c94dfad4e405a5be38aabd3c

Transaction 970dd5dd17bbd59d28a41a647df174687f88ebcd18f8f416fd1b55325954427e was carried out on the Monero network on 2014-08-20 13:52:20. The transaction has 3107606 confirmations. Total output fee is 0.005660650000 XMR.

Timestamp: 1408542740 Timestamp [UTC]: 2014-08-20 13:52:20 Age [y:d:h:m:s]: 10:100:04:01:01
Block: 181668 Fee (per_kB): 0.005660650000 (0.004351730931) Tx size: 1.3008 kB
Tx version: 1 No of confirmations: 3107606 RingCT/type: no
Extra: 022100d5959039cabbedccd08892b5991554cffb174bb2c94dfad4e405a5be38aabd3c01bbc599b9bf8bb7ded116b644e991a258836a5fc8b3e627a66aa1c64895ec22ad

10 output(s) for total of 21.554339350000 xmr

stealth address amount amount idx tag
00: de8acaebe500aafc61b4b068fdc6ba1930dc671c750afd5601bc58c433adf281 0.000339350000 1 of 2 -
01: 4ecc6897d715f0345998e64b32962787a276d6d037e8ab84318c89c33de8679f 0.007000000000 177461 of 247340 -
02: fc34c918c2ae85a926aa84917a452f04f2ed02c77a7197c4f7b669ab82a22be1 0.007000000000 177462 of 247340 -
03: 33748440ff8ccda30c73e9109b5e14722b043049c2498ee3224cb6552aebe2de 0.050000000000 122722 of 284521 -
04: 1adcfd5496b58d48aea6e9ee6ef7788831d4e834e386a029f480026d88bdff84 0.090000000000 109493 of 317822 -
05: 9a6898e0d9e9166d225b947913c63533d74f4d47b095f7405ab901ccb991acf1 0.600000000000 158211 of 650760 -
06: 071cdfc5653938e4a1993d0eaed1f89f71e85840a5ebc66cf724e8eea416ae54 0.800000000000 124872 of 489955 -
07: a71a26059412195b4a9f53a3f81d1014fbb185837e7b00517fb159737a5aefd3 1.000000000000 203592 of 874629 -
08: 4365229125e567459173a25de9fefa473e848b36a4b7dfb345677593d267f7ba 9.000000000000 16843 of 274259 -
09: e3bd8befc65093a64e5432337cfb9d43fd2895f888952402183884b47a08c41c 10.000000000000 209522 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 21.560000000000 xmr

key image 00: 7b204300ee1ab7f62418dd4bfb8f25e67d169bdb67fd41a017a470978b4af011 amount: 0.800000000000
ring members blk
- 00: 8dd181e68287f15f2a2965b688beb81749454b556ae7ebed5335dd906feea857 00112717
- 01: 337c76c31b85f4677448db6958157028273c5068a10c08d1ecdd4fed8a0c1adc 00181260
key image 01: 0f316833cbd719edbc514bd33facd34d6f58517f3e05f0e7daca5844163d258f amount: 0.700000000000
ring members blk
- 00: 93e11bfcf5689274eccbaa55712357709ddcdf4a52ce29a7a421db98cb10d893 00082289
- 01: 1f9ccf6263d526fa66e135316f019a577f1c0825f795438ac9b46af921308ae4 00181647
key image 02: f795933bb891e50a18407aef381993b38ca4fb3dc9ac6b712d8de9b58c8cd45f amount: 10.000000000000
ring members blk
- 00: 32e23b67af772d97ef22884a1daf3062dfddc4f57431366c6ac4aecf5dd5bb5f 00122015
- 01: 08c6b84b7779e50c39513df497966ccc4b510c233e6437c6a8ba41102d6e10a4 00181596
key image 03: fe761445346a38cdea9b904b4471130ad4c9d324402186b9f6b4ed3b5699a135 amount: 0.060000000000
ring members blk
- 00: 6058f9d0a00cb7eda686f9c4af822c627549383025a11a1edc7f47e4bb38b10b 00058877
- 01: 58da0f40f865bb7de6970dd8973ab852dfb0c7ae3c1d6fe344314732147297de 00181632
key image 04: 82d674eafeed0453c591e7d2fe4df9871897d9f268a11c9a39b32c39816eeb97 amount: 10.000000000000
ring members blk
- 00: 0baf8b4df7caaa8fe7b13676f255cd4338c4a69de4489f15a6139fd2873d6780 00085678
- 01: 9acc33ba760df4fe4d5d268d434954e6e32d0a12b6fd8858cade7b759920c0b7 00181452
More details
source code | moneroexplorer