Monero Transaction dbf60c56d35b959fe4253b11f83a8b675d457974e92f9c39f32e5cc7dc21b923

Autorefresh is OFF

Tx hash: dbf60c56d35b959fe4253b11f83a8b675d457974e92f9c39f32e5cc7dc21b923

Tx public key: ec86d143c983fd1dda3cba3621a77e8fe47803c5e692d78201eca6fb310f9b33
Payment id: 3080071bfdf84947e14772a7ba2edcd0c51dc29b084529c0a071229dcbc98aa5

Transaction dbf60c56d35b959fe4253b11f83a8b675d457974e92f9c39f32e5cc7dc21b923 was carried out on the Monero network on 2014-10-21 06:53:20. The transaction has 3032922 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1413874400 Timestamp [UTC]: 2014-10-21 06:53:20 Age [y:d:h:m:s]: 10:057:12:47:53
Block: 270018 Fee (per_kB): 0.100000000000 (0.126889714994) Tx size: 0.7881 kB
Tx version: 1 No of confirmations: 3032922 RingCT/type: no
Extra: 0221003080071bfdf84947e14772a7ba2edcd0c51dc29b084529c0a071229dcbc98aa501ec86d143c983fd1dda3cba3621a77e8fe47803c5e692d78201eca6fb310f9b33

5 output(s) for total of 26.400000000000 xmr

stealth address amount amount idx tag
00: a0d61d7835925894a96bfd45572bcbb734a4e531deb6847a8fa8f29df9393d88 0.500000000000 393780 of 1118624 -
01: 56ccdd92f2aa46933db361e418ca6c27156f6e70dc1aed82d3a06a59e200fbb1 0.900000000000 148489 of 454894 -
02: 07dd8750e093e6dc7fcde6220dc0e96711d51e9072faa280584bc803aca9c1e7 1.000000000000 310653 of 874630 -
03: bfcff7d014d3b995dfe503c5d1ff6dbdfd0dc81d08112c5c0f0efd409de45020 4.000000000000 126503 of 237197 -
04: b630de6ddbc0162f68b28b223fe539027f5a6473bbb3877a024050debbdaeea0 20.000000000000 17842 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 26.500000000000 xmr

key image 00: 2110ff5c59cc04640a6250c412a8e91cb7c4aed81447af0de3d3266f57401fc4 amount: 9.000000000000
ring members blk
- 00: a4281e9ab9d6b7633f7ad030025b513a774fcd9b4bea7d59c164d1d09b52901a 00269417
key image 01: 5d80bbb6cf274f6306272a7d9038988bdc8b4b2931745314d9d4ea68adcb0a84 amount: 9.000000000000
ring members blk
- 00: ce34630c5f4b789d5fb36dc69a93b3bdac0b7da22057e651b20fd18215e96f88 00269818
key image 02: fa96c7ecccdf861ab9cffe59a3e3eba68b097185a68f8628fa25012e7093f475 amount: 3.000000000000
ring members blk
- 00: fab8ad98c8e7d4baffce87def8d3b434f2b612e0d83a60ea4ba70837cfef5422 00269917
key image 03: ff29b922e7cc75f81912cf8962cfd54c0f87883f7b943cc558a81d4339cfbfd5 amount: 0.500000000000
ring members blk
- 00: 2c2354d5f4e47340908770e5d374a275a79f4f7bebd13a645471c09ce8379e03 00268585
key image 04: c4650d2f49509c2a69aa143fcc7ae711cae7e7775f32eb81c07ef6d631529cea amount: 5.000000000000
ring members blk
- 00: 4258c6bde674c251ef22e6bda7d95298aa6659c0efe7f147aed02b200f371f72 00269899
More details
source code | moneroexplorer