Monero Transaction b0d02b600dc6076958fb2ff8da7a96caaa4d381583916792dc6f5927aab886ac

Autorefresh is OFF

Tx hash: b0d02b600dc6076958fb2ff8da7a96caaa4d381583916792dc6f5927aab886ac

Tx public key: f9249853c3b420f82b7585c33bc199d9f86d2f34c160645976a58fff84d72541
Payment id: 61b219783a33cf3ede71cd6cdb7a4883f3d4517fd66953c4e15f99d1b379aba8

Transaction b0d02b600dc6076958fb2ff8da7a96caaa4d381583916792dc6f5927aab886ac was carried out on the Monero network on 2016-02-13 22:50:54. The transaction has 2340889 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1455403854 Timestamp [UTC]: 2016-02-13 22:50:54 Age [y:d:h:m:s]: 08:297:01:31:48
Block: 955056 Fee (per_kB): 0.100000000000 (0.183842010772) Tx size: 0.5439 kB
Tx version: 1 No of confirmations: 2340889 RingCT/type: no
Extra: 01f9249853c3b420f82b7585c33bc199d9f86d2f34c160645976a58fff84d7254102210061b219783a33cf3ede71cd6cdb7a4883f3d4517fd66953c4e15f99d1b379aba8

7 output(s) for total of 69.903990441786 xmr

stealth address amount amount idx tag
00: c4cfda9a0df7bd6fde43403376cf2c8dfc37811e698204d112e7a0778ae3ae60 0.000791354830 0 of 1 -
01: 0063e0e25985829f92e76fdd963378bf0eaec1d58eecada570a717277b5e3ec8 0.060000000000 192468 of 264760 -
02: 1f49fa00c9e87d645591468b842254694ada263842abe15e730ba1f404cd0984 0.800000000000 381175 of 489955 -
03: 2c60e3b43c861f7e69e65a404a2c4a71b118e80351f00bbb0ccedbef158c11a2 0.003199086956 0 of 1 -
04: 7afd439277bfe807404db3174334fe534e2ad784c7c7107108361f05b27266b1 0.040000000000 220471 of 294095 -
05: 3c217d97bff445a2c57e7a490656277e7ecdbac7ab30e22833ed4778b24b2b08 9.000000000000 174343 of 274259 -
06: 3a86d53a5826148ce1f58e3f184d5c1d22a28eb2f949075e42c4ff42bfb6e001 60.000000000000 13218 of 26317 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 70.003990441786 xmr

key image 00: 908bc57cf44f67f9d035d9c889581e578ebfc5a5f2eca3ed5f50aeacfb708771 amount: 0.003990441786
ring members blk
- 00: bc45ba576d685cbfd682e1546e11bdbaaaa10fd83e3638d372a5c5a627c76d75 00931331
key image 01: 6265d58e0623bcd2d517a654541b13578802172c2b11cca7148c4af949be731c amount: 70.000000000000
ring members blk
- 00: 8ac3a5f3b32459b508186e7917787ea96a9b928f9e5ee802ba50066a3a24d773 00954671
More details
source code | moneroexplorer