Monero Transaction dd3f6f5d16a0d052f9904a0e7c5fa34f9f79c109c925f025c2a7ee46371cf2fb

Autorefresh is ON (10 s)

Tx hash: dd3f6f5d16a0d052f9904a0e7c5fa34f9f79c109c925f025c2a7ee46371cf2fb

Tx public key: 0dd3f2c44e4ec5f55245c49ff8d4adf2bbeed6f7c6d230ec318b1bbe987245af

Transaction dd3f6f5d16a0d052f9904a0e7c5fa34f9f79c109c925f025c2a7ee46371cf2fb was carried out on the Monero network on 2014-06-30 20:46:51. The transaction has 3193993 confirmations. Total output fee is 0.005029044114 XMR.

Timestamp: 1404161211 Timestamp [UTC]: 2014-06-30 20:46:51 Age [y:d:h:m:s]: 10:169:13:50:09
Block: 108669 Fee (per_kB): 0.005029044114 (0.009865404545) Tx size: 0.5098 kB
Tx version: 1 No of confirmations: 3193993 RingCT/type: no
Extra: 010dd3f2c44e4ec5f55245c49ff8d4adf2bbeed6f7c6d230ec318b1bbe987245af

7 output(s) for total of 4.999000000000 xmr

stealth address amount amount idx tag
00: 49ba846b87cd3b287bd45af8c8648cbef8f12046d6ab947fba58302f58e43856 0.009000000000 145887 of 233398 -
01: 9f7f6795b926c3e90e36b6989919ae27e9484982cba86238c9ca712d58285710 0.090000000000 71196 of 317822 -
02: ad6d8bf9e27187387d6df42f8082e0870f55cc4a912cfcee668539fe8b393f0c 0.200000000000 118863 of 1272211 -
03: d5ea6b6014569bb8105a7736db200a83e2357db3708c3c9a92ce9e61f6e8aaab 0.200000000000 118864 of 1272211 -
04: a94d2988c41cdde6660ff595cf3871fb8cc17d4cd98fdb4d85eb7145be24d0a3 0.200000000000 118865 of 1272211 -
05: 46da93fffd84ea8e39800bd9de66454d7428526ceff89b86bc617d13e1393967 0.300000000000 75499 of 976536 -
06: c0252b4d04601ee39f939c6a7f35207c7520777ddd27640246f8930c91f72fd3 4.000000000000 16718 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 5.004029044114 xmr

key image 00: 1479ad4b08ebe9c4d9c6a4c0ab50fe45af3dd84352e9148fe904e85e16fa07f8 amount: 0.004029044114
ring members blk
- 00: a20c60f6390a5b80b4665c35d80bf8c1bac1b6794dc5d80d3aec1b49d4fd1b4d 00108032
key image 01: 9a423d76f5b8bb38b61ca4f458bdebb9d3afde9e265559322d8d8621b100c0d3 amount: 5.000000000000
ring members blk
- 00: 8f4860a484c8d6709c0c3ec37a2628dbc44d7972a8f961750620837a46cba443 00108577
More details
source code | moneroexplorer