Monero Transaction b66f139e890df53109c43dd1c5035ae0f9631f5cd30616ad6042c520af2a2b7c

Autorefresh is OFF

Tx hash: b66f139e890df53109c43dd1c5035ae0f9631f5cd30616ad6042c520af2a2b7c

Tx public key: b55fe979ac89e7ae98ca58fd4b8a84ed45ac5648d29d5b51ff6a22990a54ea01
Payment id (encrypted): dd98d70b0e9cc814

Transaction b66f139e890df53109c43dd1c5035ae0f9631f5cd30616ad6042c520af2a2b7c was carried out on the Monero network on 2019-10-13 05:32:14. The transaction has 1357056 confirmations. Total output fee is 0.000039400000 XMR.

Timestamp: 1570944734 Timestamp [UTC]: 2019-10-13 05:32:14 Age [y:d:h:m:s]: 05:061:06:56:10
Block: 1943524 Fee (per_kB): 0.000039400000 (0.000015511572) Tx size: 2.5400 kB
Tx version: 2 No of confirmations: 1357056 RingCT/type: yes/4
Extra: 01b55fe979ac89e7ae98ca58fd4b8a84ed45ac5648d29d5b51ff6a22990a54ea01020901dd98d70b0e9cc814

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: a3196f8b3e6aa810f0d5ef7f6f0c1e7159a2d48b852a0f4d362040bc216819a8 ? 12703149 of 121341369 -
01: 57ec3b7a10c023566072d09411173bdbc318d2dfac022c0877f3bbfb40560f05 ? 12703150 of 121341369 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: ae4af5d855d6cf10374e5ecf11e992bada3fe47230c3c18478f90666c25e52ca amount: ?
ring members blk
- 00: 45e8890cd7fcd34b2428ef2cef0d80b75646891a48a9a8c0bc0d499cc7cd3e82 01920958
- 01: 69221fafc57e169b2cf5a26f916569d035abf29df21852186511ba8bc3764fb8 01936940
- 02: 4b4436cab338acae06720c566bb9ce40b63c1b9f2718d9fdc2c7598c7c6be5e6 01942447
- 03: ca1889ea3b971083a399e32233295715cfcfa50610ac2b275b12d5ad05b91610 01942673
- 04: d1e38b27de9455d8ed37ea4d010450fb233bbc91fc8b5fbeda4455cff815c8d4 01942725
- 05: d446f20b4f702b7e1f8aa16f648d26f84c59c4b5637d78fc1643dc9f8e96a1be 01942905
- 06: 9d15f3ed1452e87b4460fbd54973f85bc9a18505021079779379c00164f5b6ff 01943114
- 07: 6b40be10c8677d6291f3b3e5f0c6dc3a613bcd45a2644e60f34e31b16faa9992 01943468
- 08: 6ed125f93be6ed06b7b9e3f0711122f67d8bb3dfb9c77b40ca8a6829d5fd34d5 01943484
- 09: 105c619e52b2c563b0886ecfb3b2b2afcd9248920a7b1e337df75d532988c9d9 01943505
- 10: 1b901d63668d6920f1d3e7e880ac91cb77687587b5c3613a81bff6ab826c8ec3 01943512
key image 01: 4242b2db89b9d0a7e73e99ba43a857022a12a5935802b9883836671dd8f6a6c5 amount: ?
ring members blk
- 00: a34c7e15e62b96146ce0cbdab965db22364e966a747ad73c742255910ac16e1e 01235372
- 01: e3371533f4201f7908803d40aa59427c6c3843ab936a0fda0b90ea1f8a10db3c 01913108
- 02: e9ec0e5277e144ae963d96222a354f87e6c11df457b38d41f55d333a8a8e3b50 01936082
- 03: abcf772e3f3b752a3758f58bfa5646c4972ced5353492b2c68d6230be13702eb 01939971
- 04: 15fe0078d80de0e2fd0512ff768fe21e3a7632e2e1551254eca526d516eb997f 01942941
- 05: 15a3088d3503100fa0cd201410e08312aed0a4a41cbcbf506e4c9ec938faae3d 01943043
- 06: 727aee0372e484445768c9b9394495d8b9a1b394a80eb75678f61ddfb3d19125 01943250
- 07: 43312940a5db6d7b70329fd1895fc4422e0090b0cc0564d0629f476da7738b92 01943365
- 08: 22d81249f9a02ef6a3024771fb067fdf7aaafcd8026f17aa84e9d9bee81fae11 01943449
- 09: 866c38c1675b72449ab726a066e501b3e2fbc05a963d838a9182edce9b26e8ed 01943481
- 10: 0dd47886e96ee793e52ae860b38458afffe7998805e7976bd6b9ff14fdfb2e0a 01943487
More details
source code | moneroexplorer