Monero Transaction dd01daa279cfdebe2b55868f346c8e0868f0b86615d91173060e6ac4a34ac34b

Autorefresh is ON (10 s)

Tx hash: dd01daa279cfdebe2b55868f346c8e0868f0b86615d91173060e6ac4a34ac34b

Tx public key: dbcced5110f27022779f7a4fc342a7822b39382d4ddbab4f4de84dd6aa8a8630

Transaction dd01daa279cfdebe2b55868f346c8e0868f0b86615d91173060e6ac4a34ac34b was carried out on the Monero network on 2014-06-03 19:01:33. The transaction has 3208891 confirmations. Total output fee is 0.008000602659 XMR.

Timestamp: 1401822093 Timestamp [UTC]: 2014-06-03 19:01:33 Age [y:d:h:m:s]: 10:162:15:50:27
Block: 69385 Fee (per_kB): 0.008000602659 (0.006068605276) Tx size: 1.3184 kB
Tx version: 1 No of confirmations: 3208891 RingCT/type: no
Extra: 01dbcced5110f27022779f7a4fc342a7822b39382d4ddbab4f4de84dd6aa8a8630

29 output(s) for total of 5.992000000000 xmr

stealth address amount amount idx tag
00: bbb2b2a2cb862ffe862c425f8d7400b1653f5209d31d49f33c18b4a2cb523dda 0.000040000000 27247 of 58748 -
01: 966a906cdb2e9dcb8192c502004a2892eca09f2de45a82dba87cac9fd05d2372 0.000110000000 630 of 2062 -
02: a328edddfbcac1511e5f316b17194caa979dc0b26b9f4d269f2174943a8d6903 0.000210000000 645 of 2122 -
03: 3e4091d63fb1e2f6329c9b16037a7bd1f633915cab5638b0b7f29bc175da3085 0.000220000000 619 of 2070 -
04: 1f0296ee0af978c1b71062f895a5dbf6e737fe544a3a45704d6171088b00bfcd 0.000430000000 651 of 2079 -
05: 47a7f39b1b2abc4d83882b11958b13af65362ca358866a71f62d06c969daf919 0.000490000000 708 of 2154 -
06: d8fba7f9e372e76933d57fcb2aaa2121397e5c2666a8d31d4d9d4db06c97e2fe 0.000820000000 706 of 2176 -
07: a9563f438d2912ac3675b967929b021f90b395ff61f637bf36aa2f9511e77da5 0.000970000000 669 of 2229 -
08: fc4842b2122968e282482a312abb9a79d5e95da1db8f89b0669d0d388e17f707 0.002230000000 115 of 389 -
09: 0c7e164083ce6cafac8d2aeebb8ecddf1106f92fa891a708d6f6fa7defe6c2ab 0.002510000000 130 of 417 -
10: deedeb81fc89941c4a272bee7e3c5a1da376338403d51df3abda238d9a8a1873 0.003960000000 113 of 378 -
11: 15ceacb854a6aa21a7813d630deeadc1863b6635ec23a08123b7bf330a53102f 0.004260000000 128 of 370 -
12: a5c0589d6262ae82359225adb5c969e865ab63cea237d39c5b19f7655979a2c4 0.004260000000 129 of 370 -
13: 1c134982c8e079a2e47b52dde60927d0bedb195e785e5286e5ece837a275e8f5 0.004620000000 116 of 371 -
14: 0f858061b6dbf2f5add70a3bbc8197295e16c985380c9d07438ad9ff6c73dc1b 0.004870000000 117 of 385 -
15: fbcd3382601e7bf28a7a654cc7568c2b8889739fbcfcd0506b58cb259f093821 0.005000000000 43387 of 308584 -
16: a823d82ff8f5954ce19688d25c6b7ac811e46cbe03f0318741778fda76c406a5 0.006000000000 40661 of 256624 -
17: 1a0cc134f47f962dd4fc6f3e05fd13848d3bed56f625649cdf32e6939a6b02b3 0.006000000000 40662 of 256624 -
18: fba8dedd4678a8713ab8f0de0ebca8c2f9ecad42ccbe5cefba80bf807e5da62d 0.008000000000 37393 of 245068 -
19: 73467ffeebca778a1863c71e22ad9b1f289d277b5c439e5e6b09a5d433b23952 0.009000000000 36530 of 233398 -
20: ad34ee1c8137a2915c9a9453ea9d61f65b47ac2e9883ec9fef5d088b4be6d3e9 0.009000000000 36531 of 233398 -
21: 2f87fc121ae4d14ed6adc8819b86d105e2b82e674eb9cec030f0909707ea9a07 0.009000000000 36532 of 233398 -
22: dda561187431d791ebc0a4528f1cf09fd0b354da1dd123082fa9713010a6c3bb 0.010000000000 75446 of 502466 -
23: b714928de9249d95bc7f2602552893dfb73ad0de970db1114cce1888e06af168 0.010000000000 75447 of 502466 -
24: a2c7d55bcd8fccd6bb46ffcf8b670fffa827f528d6bb8a5f66683b97bcd87eec 0.010000000000 75448 of 502466 -
25: eed18d7990c203181eb8de296a8637699363b65635e6ac53f29c4b71e79a5af3 0.010000000000 75449 of 502466 -
26: 421f186981c83564d8145c128fa7f1c9e81e33c0a0f80ec1e2c65fadbb70554f 0.070000000000 19987 of 263947 -
27: 8b16328f09d8cf9165778c9db825f01781aea18cab63ca7a24524372a2cb9e58 0.800000000000 10336 of 489955 -
28: 1357dce85f5dfc9b1ce571d237ea54589f167d83d289367d0ae965c6915a6395 5.000000000000 3992 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 6.000000602659 xmr

key image 00: a98da25df7272051c7ce41c7b5ffdaa73854efd1474d4f7986e7bfe4e09175e3 amount: 0.000000602659
ring members blk
- 00: 810408e10569f7c60f6cc495c6ab8ea0ac4c43e4e7755c5923ba30b3246ff038 00067762
key image 01: ddad9cfcab7805b67f44ae8943c36e56922851f2a64100158a581b3184ac50bd amount: 6.000000000000
ring members blk
- 00: 12037826da8abd47903201e7076ae5b7b2c3ec3616fd37b49d439b3bc2b916a7 00069269
More details
source code | moneroexplorer