Monero Transaction b1d6f4e6d3cd9ea7730fcf2b87e2391eb18d67c8efe63c4841d5397af2e75e16

Autorefresh is OFF

Tx hash: b1d6f4e6d3cd9ea7730fcf2b87e2391eb18d67c8efe63c4841d5397af2e75e16

Tx public key: fd701a8aa973853961024b0a5f4e35376e7e922c614b765896dee198a4e859bf
Payment id: 319497436208459630a863eb42a0f24728dfbf9d96256edbd5e07e03a4337c19

Transaction b1d6f4e6d3cd9ea7730fcf2b87e2391eb18d67c8efe63c4841d5397af2e75e16 was carried out on the Monero network on 2016-10-14 08:46:43. The transaction has 2148008 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1476434803 Timestamp [UTC]: 2016-10-14 08:46:43 Age [y:d:h:m:s]: 08:066:11:35:57
Block: 1157147 Fee (per_kB): 0.010000000000 (0.012472594397) Tx size: 0.8018 kB
Tx version: 1 No of confirmations: 2148008 RingCT/type: no
Extra: 01fd701a8aa973853961024b0a5f4e35376e7e922c614b765896dee198a4e859bf022100319497436208459630a863eb42a0f24728dfbf9d96256edbd5e07e03a4337c19de202ef4ba29012808ea1c4402c47d9f130d8b6b0bbd4d3b485104d574a15be9ada7

6 output(s) for total of 1.070000000000 xmr

stealth address amount amount idx tag
00: e68df9d902d7be0b1f8af45739d6b129b36b3a9a3dfaccb03a07ad34c33e6e39 0.005000000000 281540 of 308585 -
01: 574387df316115f21c1978e6b57d80735aa8cb4b4c766dbf1b3c3ac53cdf9b50 0.005000000000 281541 of 308585 -
02: b8f88e30c23a687f90f59d8116e85554fac927aed0fba09ba7491750945e88a9 0.070000000000 230611 of 263947 -
03: 2a6b95ce4c2cd72f3b0d90351611c1c4d418535044149a38d02d46dfc4903655 0.090000000000 266442 of 317822 -
04: 67f4b599e83063ae3a87121ce055121fc6f42263dbac89dc378aa6e1ab4135e5 0.200000000000 1192231 of 1272211 -
05: c3b4025394de27d04f482ade0c77ab484d6e9d82b05c9fa5561bac0372f0efdb 0.700000000000 479071 of 514467 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 1.080000000000 xmr

key image 00: 2db4bd255f9a2b6951803e45af7f58f15385b7767d2f880b4de0d68a4ebf7998 amount: 0.080000000000
ring members blk
- 00: 4f77822fa4690ab473008135c8a08d173f98d47094f28a37a8a7f36da9106aaf 00087779
- 01: 27661049e7009620045345227ba20ac7853025101c14e72d40373430a1fdec6a 00449441
- 02: f8d391731a4d6a21a09d0a9cfe30859efae954811745d3c09aa65963a0cdc2f6 01157118
key image 01: b58c6d80e4e5bd54e1752b588340a0023da299195641bf63d4672b692c3fd025 amount: 1.000000000000
ring members blk
- 00: 9f9eee84924e24a8e971abb64bfe9a43773aad24eb8e681a37f2891de7da2efe 00197892
- 01: 79cc66893ad330e07eeea0593c5d509ae47befeb52355e7065a36908913b8d01 00410697
- 02: 3bc153ee55bc2e33911a882d5c2cfdaa4e594ad02e2d35eb9536c385db374617 01156905
More details
source code | moneroexplorer