Monero Transaction cfd1dbd3014645fba01d3ca3f625cf2d99b430d85b1a18ebe30dd82005ad5fd3

Autorefresh is OFF

Tx hash: cfd1dbd3014645fba01d3ca3f625cf2d99b430d85b1a18ebe30dd82005ad5fd3

Tx public key: c1eb5eb874cbc2d212b7c408e89027b9f88a42559ca4d1f9e0391beb9d5d9c09
Payment id: fdf80cf8dc413b52b7acfcca7ca55043426676a10e5a51e61c43dd663c250517

Transaction cfd1dbd3014645fba01d3ca3f625cf2d99b430d85b1a18ebe30dd82005ad5fd3 was carried out on the Monero network on 2014-08-08 10:47:02. The transaction has 3125052 confirmations. Total output fee is 0.006587410000 XMR.

Timestamp: 1407494822 Timestamp [UTC]: 2014-08-08 10:47:02 Age [y:d:h:m:s]: 10:112:09:52:30
Block: 164304 Fee (per_kB): 0.006587410000 (0.008156599565) Tx size: 0.8076 kB
Tx version: 1 No of confirmations: 3125052 RingCT/type: no
Extra: 022100fdf80cf8dc413b52b7acfcca7ca55043426676a10e5a51e61c43dd663c25051701c1eb5eb874cbc2d212b7c408e89027b9f88a42559ca4d1f9e0391beb9d5d9c09

6 output(s) for total of 1.503412590000 xmr

stealth address amount amount idx tag
00: 178fdeeee6a56bbf85b7e8c83b65595966e87ce859973ef7c395911af859d01f 0.003412590000 0 of 1 -
01: f7d81bc20d8e70f4c6b192a31b6920da046fafa52fd64eb600405f12866a9111 0.050000000000 115753 of 284521 -
02: 4ac831dd23ea6411f838d26f7c779b27d72c7ebcf187ce3d727efabdc8884afc 0.050000000000 115754 of 284521 -
03: fffd388aaab26dee29d192a8f1a0d45e044e98ca29f80693e717cd3cff8dc78d 0.200000000000 335103 of 1272210 -
04: b973c6309a81be22884b72572d181c4467c4b16da933542a7b8cd8b1b158c3cb 0.200000000000 335104 of 1272210 -
05: e0eada52f3f99dea058107753bebe07e722c08cecb7c99d7aea30c34f0563f9f 1.000000000000 174333 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 1.510000000000 xmr

key image 00: 479fe831486b16182afa63be56964b9ebfa820f9ad43f2d1b35c8e29545e5480 amount: 0.010000000000
ring members blk
- 00: 59f2cecefc081cfa5e8451fc9d03bf6ba33547ffb8bdd81b3f2db6f46163034a 00088803
- 01: 54fa3cb6948a73b2f7eaf431d64d17ef033c260acef4a8cf604844a2f565e5e2 00163751
key image 01: 5373be8048f578adbc60580c0e9808ea39f48452964b41727055649f64a895c0 amount: 0.500000000000
ring members blk
- 00: a498d49d03268223dbd1717bc50d6df7cc108941bcc5d3fc4f170874b70ff975 00126549
- 01: fe460742c06a1afa11227ffc90e9c8b0f626c30624cf6bfbb2bce36383bd0382 00164115
key image 02: 4894048036c041398a5a114b29aba0743fb78911c3dc4c22c11402b6a46b6472 amount: 1.000000000000
ring members blk
- 00: 72f3ac2227206b86b07001c7a91abeeaa5a178f52e317b7ff30a7a35f1d9947c 00120019
- 01: 62bdabfacd46352f0de12c9195264932cacfbdbdfd69777a116abc774ef6148a 00164045
More details
source code | moneroexplorer