Monero Transaction d12bd6ff9c3a7fbf636ff2504b3b79c613232d15a5813025b32d7e99104ced80

Autorefresh is ON (10 s)

Tx hash: d12bd6ff9c3a7fbf636ff2504b3b79c613232d15a5813025b32d7e99104ced80

Tx public key: edd11c53d350f6086acac330d71c9b6da053c5d5beb900f4d99d5ecfb9c61662
Payment id: 14700ff2cf2d423d86f2cadc9c2f967cb7cd8ee051c34283b684f7b6a3b41228

Transaction d12bd6ff9c3a7fbf636ff2504b3b79c613232d15a5813025b32d7e99104ced80 was carried out on the Monero network on 2014-06-17 14:57:03. The transaction has 3153123 confirmations. Total output fee is 0.005232485764 XMR.

Timestamp: 1403017023 Timestamp [UTC]: 2014-06-17 14:57:03 Age [y:d:h:m:s]: 10:099:03:09:55
Block: 89365 Fee (per_kB): 0.005232485764 (0.001446561939) Tx size: 3.6172 kB
Tx version: 1 No of confirmations: 3153123 RingCT/type: no
Extra: 02210014700ff2cf2d423d86f2cadc9c2f967cb7cd8ee051c34283b684f7b6a3b4122801edd11c53d350f6086acac330d71c9b6da053c5d5beb900f4d99d5ecfb9c61662

1 output(s) for total of 3.000000000000 xmr

stealth address amount amount idx tag
00: d4a5fe87b63e6603a51eba1fad48a86efa92c867a5407bff4be20c7730f3401e 3.000000000000 11006 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



34 inputs(s) for total of 2.392586729757 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: a4f695fdee648fa14e0ed17c13619e6b9431fd110bac4dbe5d3668e7b617c37d amount: 0.004586729757
ring members blk
- 00: 60bb0680cd39ed34c52b6c3c848fe1036f2edb87082555cacaf4e8e4178da236 00089057
key image 01: 2f05e38b821d8b62c876e3a022f467cc42a5987dc0175f57bdaae504f87d3776 amount: 0.100000000000
ring members blk
- 00: 4527ecf5ebf156c78c1d680aa23065ad266fb80dc8801be8d2ee92a8485e4155 00089192
key image 02: 2ba6cd7b2a7edb9b16dd45da4a3d1dd52f59a4280c1fc2271131223744b12968 amount: 0.008000000000
ring members blk
- 00: 241cd8d48e23b8678f7e533b3d475d8a7ff042d6b74743dfe25ef09b116d22df 00089161
key image 03: 70584514665eaa8f52eb2eb7c3b876345bbb9043213d18a60283e08c48bef702 amount: 0.020000000000
ring members blk
- 00: ac97a6a858976f9209fbe3c92cec8bf66589578a7b8d90353191179d26c97227 00089341
key image 04: c113345316db3b5cef8f3d2bc620f7f3aa04cb24bdc12c647cf332c6dbfe96e9 amount: 0.030000000000
ring members blk
- 00: 35fb7d6b43e99b6d1540b4a4eb22cfacdcb8556cc177b9ed07732bd1b449517c 00089128
key image 05: 384412bb8897103e6b329123888893f967bce0c00a282713f0cef0ded5d83305 amount: 0.100000000000
ring members blk
- 00: ea563f78055a7faddc2a3e3ec07acded4bbd2c47d152b18bd0b038680384db33 00089179
key image 06: ad9ab61a3de7eb610a1bd3bffbc41802619512bb61de6d7a6a251f123887b8a2 amount: 0.020000000000
ring members blk
- 00: 60893442c2d82a86eb0d482320a6df529202940c0b85d2e151600ac3e718f773 00089192
key image 07: 7c09a22708e54722de005249a931765810b78bd355063cbb42c80ef8716955f0 amount: 1.000000000000
ring members blk
- 00: a02925042e1440050ffd18a2f1b376b31fef410e72c37e8542e0996192ab00b6 00089226
key image 08: bb95540de9da99215ad54dd7ce91053889533ebd21099d39c6848453eec7be13 amount: 1.000000000000
ring members blk
- 00: 455a8d4a50dbc1aa92d7704207847f2f639b084c7436f68369cc4304d2d2b242 00089057
key image 09: 05a3ece1ff21f9a6ff17bb8f724e1c617a5613772c446ffaa6910c04ff978ae4 amount: 0.090000000000
ring members blk
- 00: a96dae666f9abf35c003385b79e0b3a184140c24f572877721cee8e8b7563a04 00089140
key image 10: c40d10a1675849c5d549d99d1ed4e4e008824a07259fae4ad86c225e2764a3c8 amount: 0.020000000000
ring members blk
- 00: e678f15ae21c9ca3502977b8e8a541aaca58c3603fe1dd1b3e6bc7fd6a4829b8 00089271
More details
source code | moneroexplorer