Monero Transaction a0dd1eeaaa4ad1f2408b6184c77c6e4613c109fbf1d261ca701fc7cb17fb0d13

Autorefresh is ON (10 s)

Tx hash: a0dd1eeaaa4ad1f2408b6184c77c6e4613c109fbf1d261ca701fc7cb17fb0d13

Tx public key: 71197551907f61386b4bc9ac0360c579cf702b455f6a5b831b11125f71929dc9
Payment id: 0823053f10517df0f7fa81ad29bbf85ed0eab17c7055d74cda2602dc1d7af536

Transaction a0dd1eeaaa4ad1f2408b6184c77c6e4613c109fbf1d261ca701fc7cb17fb0d13 was carried out on the Monero network on 2014-07-24 02:22:13. The transaction has 3147588 confirmations. Total output fee is 0.006458356020 XMR.

Timestamp: 1406168533 Timestamp [UTC]: 2014-07-24 02:22:13 Age [y:d:h:m:s]: 10:128:08:59:52
Block: 142194 Fee (per_kB): 0.006458356020 (0.007549493795) Tx size: 0.8555 kB
Tx version: 1 No of confirmations: 3147588 RingCT/type: no
Extra: 0221000823053f10517df0f7fa81ad29bbf85ed0eab17c7055d74cda2602dc1d7af5360171197551907f61386b4bc9ac0360c579cf702b455f6a5b831b11125f71929dc9

7 output(s) for total of 2.138541643980 xmr

stealth address amount amount idx tag
00: 1f8c7de15f726cba02dd59e806276e992c88688d6d4fc676aa26056ef3b5d9e3 0.000541643980 0 of 1 -
01: b1e0cc059f1dfcbe740b6813a39ae16c4be77b67f6369e0ba3d760b4f46381ff 0.008000000000 157497 of 245068 -
02: f1d8862505433ed655388254304fff8aebc7071a7a188fe5acac7023a23b2883 0.010000000000 317229 of 502466 -
03: 678aa65c622003cc801b7db1c24d28ecafd072bfa8b03781bc5dd605d970ea85 0.020000000000 202830 of 381492 -
04: 54660cff3b770cf15f426edf7bf8d983383a06d01a5960fd4f550c0aeffc2435 0.400000000000 109949 of 688584 -
05: cb2527cb752f1ae7431056d7303abd4521eed875262150086d9c4e8208ebb864 0.700000000000 78758 of 514467 -
06: 3aae3e0bfe7537a5bb658f01cc5f945f4bb894ed4fc4de9c56f1e2e8b4706488 1.000000000000 129496 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 2.145000000000 xmr

key image 00: d0834021a152dfef2ab139a9c0b80d4e74af8e309daf4835aee4c345ece0fb1c amount: 0.005000000000
ring members blk
- 00: a7064222ff3cc29561840f8d2286135031e8dea597b6c640cbf9c11b4b7aae60 00142144
key image 01: 013a5f9ff79ca4e1072ea77cedda09d4ca145036da8893b627dd0126afb5f390 amount: 0.500000000000
ring members blk
- 00: 1cccba7b49c52a6f5115209fa2b25144c27c53aeba9bb95e55d6aa245b1ed01c 00141397
key image 02: 1c472b1d214e91128ce266f51b6cb00f899a301bfb58014364635b12cb1b8b74 amount: 0.040000000000
ring members blk
- 00: 0d2817510905bdbfccda659bc03d07472a29fc22c1e344b912ee76020d3a349e 00141819
key image 03: a49997e597b55ef848e67e2d2e14018949773118ad6393ed0fc2ed50a241b1c1 amount: 0.700000000000
ring members blk
- 00: cd8e5f261f2bd666f81966defab76a149797ac1ba8731d7c5d163a5dd9949f2c 00142074
key image 04: 5ca13821858193680317635b4d2d4be32852a3f5342183f6aff423999e7d6b4a amount: 0.900000000000
ring members blk
- 00: 770615c665597f5ea46ad17ca9ea6de64bc08eb2b5e5b06c4070e14038823a44 00140236
More details
source code | moneroexplorer