Monero Transaction d64fd99475fcd2fd2d50252e97f9a0c108bf8d50d4268083c1a68bdff58f297b

Autorefresh is OFF

Tx hash: d64fd99475fcd2fd2d50252e97f9a0c108bf8d50d4268083c1a68bdff58f297b

Tx public key: 09a09e82175d46eed740c8a5981008c3ec05dc09caa37124d9cc937b355610ed
Payment id: adbf25f7a1bf2ac2a176bededad2d88fbb197547974a18448f45813d3e2c0d03

Transaction d64fd99475fcd2fd2d50252e97f9a0c108bf8d50d4268083c1a68bdff58f297b was carried out on the Monero network on 2016-04-15 21:16:08. The transaction has 2260186 confirmations. Total output fee is 0.028717290000 XMR.

Timestamp: 1460754968 Timestamp [UTC]: 2016-04-15 21:16:08 Age [y:d:h:m:s]: 08:222:06:00:46
Block: 1026484 Fee (per_kB): 0.028717290000 (0.034800597586) Tx size: 0.8252 kB
Tx version: 1 No of confirmations: 2260186 RingCT/type: no
Extra: 022100adbf25f7a1bf2ac2a176bededad2d88fbb197547974a18448f45813d3e2c0d030109a09e82175d46eed740c8a5981008c3ec05dc09caa37124d9cc937b355610ed

14 output(s) for total of 79.971282710000 xmr

stealth address amount amount idx tag
00: a6e5bf60b966ebfd06edeea251f06f691633b8efcdc79e0e6d2860ee6573a6cd 0.000000010000 1839 of 22371 -
01: ed473f8058afa7aaed6cf3f7e8648fac517ace2f3506bb8fb40f2cef9b2d8aa8 0.000000700000 1738 of 22578 -
02: 80d5ab1760ba72c581bf2e93e73a9cd1763fe805d564c0c0e8ec7e23658a9f50 0.000002000000 20583 of 41702 -
03: 9baf97eb3721315511f31962ed0eba396052bfa4d9430281c9ebf430d2b4a1fc 0.000080000000 37259 of 59073 -
04: d721f785403b007fd1537049f2e091b3250ab69788c0cddfd615d088d4eafb64 0.000200000000 39135 of 78038 -
05: 8c552181f844b227eee1d5575b2a1f694e3fd310efa06721fbad882386bb35a0 0.001000000000 50669 of 100400 -
06: a1b15d1acee2154ab2ee06ea2288f1edb5376ff94804871b78adf4d3220a95d4 0.020000000000 316954 of 381492 -
07: 4fd248f02de91a39b47daca5816ffbf039043310bd23224178c2ea54baf66568 0.050000000000 219653 of 284521 -
08: b99420621c7434e2609895250a8a84351b13925a90e789c522e46b79c73cf8d4 0.300000000000 810039 of 976536 -
09: e12b452f34c312c8aef65f57d3f448a7cede23947efeb81759890f8b8e4f45a7 0.600000000000 562671 of 650760 -
10: a36fcc154946c91f43cb7c723af0ef6b9e77579cb9b366b79ef6816e282683f2 4.000000000000 195523 of 237197 -
11: 1f162cd6955bfd8d1bec77d46c271a57189273b336b38725171f95dc016e0936 5.000000000000 207919 of 255089 -
12: 38ef3850140796709bd22a8b426ca98ef056f0e5386ae0decd3ba150796f6c92 20.000000000000 52979 of 78991 -
13: 6d63176e038236c8edcd686388f5078b2e3a840d4ad6304362a34ea625ee3e4d 50.000000000000 27644 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 80.000000000000 xmr

key image 00: 1531664a6590b6762c01b7bc0737143787c87b6e644e680fc4350580b6895a59 amount: 80.000000000000
ring members blk
- 00: 467aa4a1063f323a52fee203533073f4348c5a771535d11a5d8ea2bcfbdba119 00302813
- 01: e6dcce9512d81c48f5bada32a6179c1c0b1e6889277517c8b65a8b3f87796ff9 00606361
- 02: 9c7075af654085b67fbeaf3ddd0d253afb416b1022003a0565d12a8b9a343c4e 01023334
More details
source code | moneroexplorer