Monero Transaction dbd3df8d221f3a325e1ff5aa0b2a34d51bc238388afcc79d87bb00fc4eb14ba8

Autorefresh is OFF

Tx hash: dbd3df8d221f3a325e1ff5aa0b2a34d51bc238388afcc79d87bb00fc4eb14ba8

Tx public key: 9928c7b6cd0167f3025a29165da3ad8cc8c0abeff5f8de1a5d31f2d658df3b8b
Payment id: a58cb189f53f0bfdcac69fe020cf7eaed9fdb9d55e4b39842584763e05376fca

Transaction dbd3df8d221f3a325e1ff5aa0b2a34d51bc238388afcc79d87bb00fc4eb14ba8 was carried out on the Monero network on 2015-02-04 15:46:29. The transaction has 2870264 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1423064789 Timestamp [UTC]: 2015-02-04 15:46:29 Age [y:d:h:m:s]: 09:300:22:36:53
Block: 421793 Fee (per_kB): 0.010000000000 (0.013298701299) Tx size: 0.7520 kB
Tx version: 1 No of confirmations: 2870264 RingCT/type: no
Extra: 022100a58cb189f53f0bfdcac69fe020cf7eaed9fdb9d55e4b39842584763e05376fca019928c7b6cd0167f3025a29165da3ad8cc8c0abeff5f8de1a5d31f2d658df3b8b

10 output(s) for total of 299.990000000000 xmr

stealth address amount amount idx tag
00: 9b111b4e57aa199ca4c0f3d23a3bdf221871a6b095026b4a74736cc6ac009b00 100.000000000000 11494 of 57197 -
01: 09a4a0b642c91d92a87ff56756227b278cbe1b61a4fa4ea248ac580214a62dc3 50.000000000000 11887 of 44703 -
02: a970d8655250d066574e001862d8c1b07b955fc26636c1ce886f632db4c7930a 0.900000000000 204228 of 454894 -
03: 3a0f890065bb49da36de826b96833fecf08d659a4ec6a86e4fb33d8632b6c1de 0.020000000000 236759 of 381492 -
04: d7732678eaf8adee430c4a70f53734ed4a312ac8a234bd623343f90cefa1d46c 0.005000000000 230421 of 308585 -
05: 34afb1cfbcc996a7e0338d746277661ddc545c0830e2816f6eb07cd8a00a9b34 0.005000000000 230422 of 308585 -
06: 18a175b53058de796a5758322d753015c946da38513434aca2d98b9cdb362946 100.000000000000 11495 of 57197 -
07: a7a03fe6d322bda65d320cdf463b8bae82dda397e23f457f2cd8bb68d205f380 40.000000000000 10768 of 41682 -
08: a559ec63b28d5d428d2e998a85ac5c130682ac0e5cb9b6f4d7258f657f4cf91e 9.000000000000 33768 of 274259 -
09: d740864c09103108f36fa1e0243f1940eb6743d0a284c7dd751b61a672ace76d 0.060000000000 124177 of 264760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 300.000000000000 xmr

key image 00: ece1a2e149781a02e79c32fed26370782958cb5c35610e130204b695fa637932 amount: 300.000000000000
ring members blk
- 00: 7d54b526159864163b5505e861b03262f23ae6549d6326a4ed4b9b5f4dade1fa 00105407
- 01: 5e171d9932944a1a20a6860ae22e197543e23c68b190e746e9d1f7245c4f6460 00204887
- 02: 101e5d96aa6bef5b1f3640cb002ec7ee4485cfe48a7078580c2b75cc0cad687c 00320814
- 03: a1230ec7cc19a63d91617b520cba60c6ae095c496fefc2cf85e4fb4fe1fb9c10 00420838
More details
source code | moneroexplorer