Monero Transaction a4dda6951d96d658a4746a262b4b42a72b77678862f5a1a33accd6693d46ee81

Autorefresh is OFF

Tx hash: a4dda6951d96d658a4746a262b4b42a72b77678862f5a1a33accd6693d46ee81

Tx public key: 754d4fd0d0be3b1ca46285e17acd736a276b20065d3ba94a44ab31838a7bcc23
Payment id: 5c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088

Transaction a4dda6951d96d658a4746a262b4b42a72b77678862f5a1a33accd6693d46ee81 was carried out on the Monero network on 2014-07-20 09:21:05. The transaction has 3157702 confirmations. Total output fee is 0.006711090000 XMR.

Timestamp: 1405848065 Timestamp [UTC]: 2014-07-20 09:21:05 Age [y:d:h:m:s]: 10:138:14:29:49
Block: 136832 Fee (per_kB): 0.006711090000 (0.006607842462) Tx size: 1.0156 kB
Tx version: 1 No of confirmations: 3157702 RingCT/type: no
Extra: 0221005c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb908801754d4fd0d0be3b1ca46285e17acd736a276b20065d3ba94a44ab31838a7bcc23

7 output(s) for total of 10.033288910000 xmr

stealth address amount amount idx tag
00: 5154ec561b16d795afd7d71f60887fec9186fe1af81b9da146e407ec65cb868d 0.003288910000 0 of 1 -
01: 9a121087cbd1c75aef73744c8c0e49bd48819efd6f5df5ed3598384f25bfb2ee 0.060000000000 93403 of 264760 -
02: e4eddec26518524f1bdc33f0ec04a34a80219851ecc0bda98ce86bc58108defe 0.070000000000 84778 of 263947 -
03: 8036f47bbf209b25c93ef94a531aed2f5ff8ce8cda319155adf620ef3b6bf928 0.200000000000 226732 of 1272210 -
04: 88ea1464dc544540125cd26a76c1213f60100b3b27c2a8e10d2c9441dde0dd45 0.700000000000 73387 of 514467 -
05: f9aed41ed1e0b3db281df707198256e4acfd7f5f626c3bf0de17cb779faa776f 2.000000000000 47610 of 434057 -
06: dd06bdeace65e708c815ae3e6938da8aeaa5ea631f61eb411dcd23646b8e9040 7.000000000000 45634 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 10.040000000000 xmr

key image 00: f98b693fc8d6928c242614499ad876ddca92d994bf541e4d5418d795683b7753 amount: 0.900000000000
ring members blk
- 00: 511847bfadff3293d92b50ecc5468bbd90e5c1d2a70923aec0cca5fcd9664b45 00064056
- 01: 6a7ec01047d07d6a4c819d16fd83bb90a65facf52808eaa91b76b7298e91b411 00136790
key image 01: 06ccfb167fb95ff2b196f2996b9c335ad1aabcf415ce45aa97cc206c90a0b013 amount: 0.050000000000
ring members blk
- 00: 83c6a2f8de90e17d288283ceffaef00ab4c550b08ada9d8af65c3e75a555a7e2 00064612
- 01: 844875695bebdf0a278d3c0b5651afbabb72644bdd6ddba0352b9e0ef2e41adc 00136740
key image 02: 5a86e97084cf39d03bd370f1a3751d5cb38619c4ed7c615f323b5aa92bae5fc6 amount: 0.090000000000
ring members blk
- 00: bcdfbe1b1294b8c1086dedee9e4b2c7f65f7b5385df31ceab3d2c38919350059 00080882
- 01: b12700d169e5d528c8195dd5b4b62d3db7073c23ca9c32a6e60d81ef8d22f179 00136802
key image 03: c9fea6875a0817ced72afa8175f0df4005f62689b9a3041d6aa6a3b58c8eee9a amount: 9.000000000000
ring members blk
- 00: a6d9dcf2826069601dcbe44ffa6fe62f8e442cce0c77386f7efed69e81b9005e 00070857
- 01: f7a7d7daf8929fccbeb46df80f79b16963c8c666db278bb2b8636969431b6fc9 00136719
More details
source code | moneroexplorer