Monero Transaction dbf104bf6238c7661945e0a400823d58a5e6bad854de248ffaed78405fa78421

Autorefresh is OFF

Tx hash: dbf104bf6238c7661945e0a400823d58a5e6bad854de248ffaed78405fa78421

Tx public key: bb5e0653fa9cd9a748dcca7a9f3972aac7ede608e4074824017c687d0bbe5ed7

Transaction dbf104bf6238c7661945e0a400823d58a5e6bad854de248ffaed78405fa78421 was carried out on the Monero network on 2016-02-17 23:15:04. The transaction has 2331566 confirmations. Total output fee is 0.015690032400 XMR.

Timestamp: 1455750904 Timestamp [UTC]: 2016-02-17 23:15:04 Age [y:d:h:m:s]: 08:288:00:34:46
Block: 960780 Fee (per_kB): 0.015690032400 (0.018174879160) Tx size: 0.8633 kB
Tx version: 1 No of confirmations: 2331566 RingCT/type: no
Extra: 01bb5e0653fa9cd9a748dcca7a9f3972aac7ede608e4074824017c687d0bbe5ed7

11 output(s) for total of 14.043418820000 xmr

stealth address amount amount idx tag
00: 12cb82483fa3516eac9a81c00abe2e13679dec226f418fe1a3139a19a48cb2ee 0.000000020000 572 of 22914 -
01: 67014d2ce88532d9f6a282dd1a0c40b11a8cc9ebb858936237f986f4f59a3c57 0.000000800000 561 of 22876 -
02: 2b9df6500db1c70901f870cf5e07983dcfe0da6d37bcdb40a85ff85367e5ab07 0.000008000000 19931 of 42741 -
03: 6759ab8d3ea0c578b971c13154b3ccd519c6ae5b47d3d6f50f82370a5e437270 0.000010000000 36296 of 59775 -
04: 3bd346231716eb085aa6c0521d3a4b32212eabca3ab18e60c5411bb1dd5d94f0 0.000400000000 36044 of 77134 -
05: 9db9d932ab28108b80bf20517a662b1fce4913285e5bf39c122c4e950212e776 0.003000000000 40003 of 90176 -
06: 5aef7984a6dbf92e656af5ea2f612c311cebfbab69b55407ba17849f141e8d63 0.060000000000 193994 of 264760 -
07: 2a383d99d45c5c9fe5b9a61ccfc0eb325f0adb2205f5e7fb15b87e6c5cfde9bd 0.080000000000 188820 of 269576 -
08: 6154a1112083b35c0e0f4fb3e389d82b5fe2aeda180a74c744b38a8ff3909cda 0.900000000000 334534 of 454894 -
09: 5ae463c58086ba5dd20c9c2251bd48a6b7d4df5a0227e7377568fbe98ac5d9f2 6.000000000000 130657 of 207703 -
10: 3f7ec112005f2a3f9f00a3d2f59fab23b61d170a339878f398c9038efb088ec4 7.000000000000 234697 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 14.059108852400 xmr

key image 00: 0cb90f22a6f7173d7de633e21a643e30ab57367cdd270a81de865fea3b29e4b2 amount: 0.009108852400
ring members blk
- 00: 01dd3ca6f2bdd34ace62bda2a60eb0616dea04e02d61177f9592850d19840a24 00928060
key image 01: 33e4cd98ab6184964e485a85d1ffcfa6e766043056a2d9e9685e939c995d9206 amount: 7.000000000000
ring members blk
- 00: 181bc840205f21a48b370bc7ac68fa0c5b0c188b9a3c7d3be6c42cc01738d124 00959714
key image 02: 4ac82533ab02297db4784f06656bd14aeaab46131e5ff3f0320a10d7a01836b6 amount: 0.050000000000
ring members blk
- 00: 8298e2e51b28f4ca66494e40481cc671fa02439516e72d4138cc2946b5d5377d 00960558
key image 03: 3251d0270888f02d681d3b8abf1030a6e3ce257bb7a2f911602a62dd0c457f02 amount: 7.000000000000
ring members blk
- 00: 09e857d860ebdc92cfb46ab74145edf543b952a04704a69f95c7c620fc1cfcba 00958751
More details
source code | moneroexplorer