Monero Transaction dd4bb9fc3a8869aeaa44b35452249136bdfdbd04a5078013a0d9bf32c647ec30

Autorefresh is OFF

Tx hash: dd4bb9fc3a8869aeaa44b35452249136bdfdbd04a5078013a0d9bf32c647ec30

Tx public key: ef09a513af7aeb63cb218a99632ca7124159eb2f07c159b8292462519813d461
Payment id: 048706a71ac531a6ae39b29982818508daec72cec172bf80375f97629fb7a093

Transaction dd4bb9fc3a8869aeaa44b35452249136bdfdbd04a5078013a0d9bf32c647ec30 was carried out on the Monero network on 2014-06-13 18:39:35. The transaction has 3194656 confirmations. Total output fee is 0.006488819836 XMR.

Timestamp: 1402684775 Timestamp [UTC]: 2014-06-13 18:39:35 Age [y:d:h:m:s]: 10:152:23:01:31
Block: 83837 Fee (per_kB): 0.006488819836 (0.003287754336) Tx size: 1.9736 kB
Tx version: 1 No of confirmations: 3194656 RingCT/type: no
Extra: 022100048706a71ac531a6ae39b29982818508daec72cec172bf80375f97629fb7a09301ef09a513af7aeb63cb218a99632ca7124159eb2f07c159b8292462519813d461

1 output(s) for total of 0.400000000000 xmr

stealth address amount amount idx tag
00: 2ee466a170777d5a6720a643e86505951690b7e40c68343444a9f36b1c1c99e8 0.400000000000 29480 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



18 inputs(s) for total of 0.249488819836 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 4b9466885263ef1eed7d8867ff00d2f5944fc5d2b5d6ef1febaafc6c4b443b14 amount: 0.000488819836
ring members blk
- 00: 16a63bb9dbe0141658063944036db725b8c5e4b284a1f751a99da6af7348855a 00083425
key image 01: c1e61f4455bb183145e479e1287afa32b690c9c4b42cb058f2a1f2914d6cc2a7 amount: 0.006000000000
ring members blk
- 00: 5a9bb5f780360aadedcbca70235dc7d7954d8171f3989c9fddbd79d647ea2d17 00083617
key image 02: b0499e2ec63148db9c7bc789b20ba4ff77e5bec7edcf86a29a49e934efc47e03 amount: 0.007000000000
ring members blk
- 00: efeb6dd753c7931a6e83b03998a5427236454c85b6bd6d46b89ba595b62cb168 00083655
key image 03: 9a26db285641d1c84ca04328f36e9607cb68e9445abd2877ea54f6c1fa7d843a amount: 0.010000000000
ring members blk
- 00: 3388292e33b209148cd5fc90e52f600dc7124f15547e960e5e7cd43e93fef36c 00083616
key image 04: bea7fca36bab4c85f82bb1d0e56d8a849153a93ed91aec532e476a2228091821 amount: 0.010000000000
ring members blk
- 00: d1531ea45b3e9c973ae233f0a9aad71c4f80042f24399d1e0433254ea256f9cf 00083649
key image 05: c8ed080e84950eb65eaa8fb540d335fc4ea64677b254e83cb35e13c39d3ca069 amount: 0.010000000000
ring members blk
- 00: 9c03a9fe92b97ca17133e7dcf289a1365a17b4a240785ac1dbc1d539ab672d57 00083642
key image 06: 0f828167c14b47abc2eaa5f7384780ad034654ab119c8e27847a4313226363a3 amount: 0.100000000000
ring members blk
- 00: f28783f46a1ccc7b9d2f885f26db4d4571d1ac32ea3bc4f4c061fe8746fd453e 00083609
key image 07: a3bee90c673ef656ac713bdc6de17b7080bb028f445cf9c37acfd89cccec7924 amount: 0.006000000000
ring members blk
- 00: 133c3c2d418e192929a2ea50a24ba5e8e2dd43366d17cd89ab33b422ef3f24fb 00083616
key image 08: ba11798fbff3463742d057cd9d6c147dac9e52aee705d1c3a412cfe1423f06df amount: 0.010000000000
ring members blk
- 00: 95b4458875e5881e30f7c45ac493e31f3f7d59f3695111455e252c9e602f9808 00083648
key image 09: b91f85d7fa1b63bcb1b7d11ea1b8e3a2143b1776b9b9a96742876c14a7a1d9be amount: 0.080000000000
ring members blk
- 00: 723774b74134902bcacafeebfd2887130a46839c1ec49f3ee8eb0b05610e2ef4 00083609
key image 10: 035d134ca3417e2f0816d125819f4d93d6f0f5c845af1cbab4b08c1b90502974 amount: 0.010000000000
ring members blk
- 00: af9b562564134319b591ce498358d1188105ecfc781cdd1b9a8983e5edfcd3e2 00083631
More details
source code | moneroexplorer