Monero Transaction cdfed5bfc95952008851d76db9e82840db72f9dfa333b67fc2a3f02a3d86473d

Autorefresh is ON (10 s)

Tx hash: cdfed5bfc95952008851d76db9e82840db72f9dfa333b67fc2a3f02a3d86473d

Tx public key: cea5a75a09295d663918c875d5b4b412e9d6fb092f4910be65633c2210c0988c
Payment id: d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc

Transaction cdfed5bfc95952008851d76db9e82840db72f9dfa333b67fc2a3f02a3d86473d was carried out on the Monero network on 2014-07-30 20:54:41. The transaction has 3149351 confirmations. Total output fee is 0.005661220001 XMR.

Timestamp: 1406753681 Timestamp [UTC]: 2014-07-30 20:54:41 Age [y:d:h:m:s]: 10:137:14:25:44
Block: 151929 Fee (per_kB): 0.005661220001 (0.008904899049) Tx size: 0.6357 kB
Tx version: 1 No of confirmations: 3149351 RingCT/type: no
Extra: 022100d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc01cea5a75a09295d663918c875d5b4b412e9d6fb092f4910be65633c2210c0988c

6 output(s) for total of 9.000338779999 xmr

stealth address amount amount idx tag
00: c83fbfbcd5d42da7177e8b6142ed622742b4124604d18a4f367315d093331c46 0.000338779999 0 of 1 -
01: 2984a644055695f953f0f1de973fd25c883c2f134cc6a105eae2e409537ab058 0.010000000000 321161 of 502466 -
02: 5d79a5de78b4e194e4d23313b81ad72d8bb16219f6268bd0d637578ea76a4f78 0.090000000000 93846 of 317822 -
03: 8e71fa5ade107a8a2a1bbdfe29e016b0b352d009f5cfa637b8b0c6da5fd5d158 0.900000000000 70957 of 454894 -
04: 90e78ad88e598785a39f5da508e4bdc667286c81264bb14d3da76677a326c98a 4.000000000000 30146 of 237197 -
05: a74aa8a24460aa090e40bfb32f13ff6117ac1b8d6c8da8cbc006b5c534a18c7c 4.000000000000 30147 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 9.006000000000 xmr

key image 00: 363cfa6678ce7949608b0f305729d5c0104d59434d9264032d3fa8c3714df340 amount: 0.006000000000
ring members blk
- 00: cb47ebfdbc6b53c4c6842d764b3a80e2a1800cc5dce39581d9eb9e7ed1a6ad28 00082006
- 01: 1d0c0d4823fee2ea46fa162b9c26b78af07f86001cebc605389da3b6c9d8a192 00151909
key image 01: e6dbb10e1cecdba608aa4f8598d8b4f94f06d81dec4d12b2b0b7c211ed00b25f amount: 9.000000000000
ring members blk
- 00: 506e5b869f26d38ee4eb54c9223609b2f4cc951c85082c5a5d70357f3b992676 00058062
- 01: 19327fcd568899430e3643a51ff724ebcaf5b0e728437714198e4b9850fad072 00151909
More details
source code | moneroexplorer