Monero Transaction dd5485ff64543a4b924bf7ba52b5800769bb9b3086c71d1cd4a01bc6434266f5

Autorefresh is OFF

Tx hash: dd5485ff64543a4b924bf7ba52b5800769bb9b3086c71d1cd4a01bc6434266f5

Tx public key: 2e620cddff0063a9ffd793772c619aa60cd487b06a6f64c51ee73cbe374d7cf3
Payment id: 6ec963f1cba9f9f255c0e22f3a6b376782dfda6049ca24a185f44c3a4090f033

Transaction dd5485ff64543a4b924bf7ba52b5800769bb9b3086c71d1cd4a01bc6434266f5 was carried out on the Monero network on 2014-09-03 11:25:17. The transaction has 3169775 confirmations. Total output fee is 0.128011353125 XMR.

Timestamp: 1409743517 Timestamp [UTC]: 2014-09-03 11:25:17 Age [y:d:h:m:s]: 10:200:09:29:04
Block: 201668 Fee (per_kB): 0.128011353125 (0.155496590273) Tx size: 0.8232 kB
Tx version: 1 No of confirmations: 3169775 RingCT/type: no
Extra: 0221006ec963f1cba9f9f255c0e22f3a6b376782dfda6049ca24a185f44c3a4090f033012e620cddff0063a9ffd793772c619aa60cd487b06a6f64c51ee73cbe374d7cf3

6 output(s) for total of 21.172851400000 xmr

stealth address amount amount idx tag
00: c11a338bf966efc85e095d441eabdec9ebea4b23e0f2242403baa071bfb1c751 0.072851400000 0 of 1 -
01: ae25c16c74dbec5b0bad14d833f83ce1073873a6360bc9858ce8355e8063717c 0.300000000000 199248 of 976536 -
02: 23ae3e44fe4bc689ea0f180000ca64f89b78f51b7caae0a9c502ab6c78f3cf65 0.800000000000 143790 of 489955 -
03: 28a315b72e0f78e7655f00fe2c569798e8c2b7951f46e9ab1ba148a5312d4ae2 3.000000000000 55055 of 300495 -
04: d45e6fb9c42bca5cc087bacac33211286f714bb488b5eb8db9b8a982a2b3b041 7.000000000000 53100 of 285521 -
05: 757d41516d5c17f02fc6a31a959f0973cdea72287fbc8ebe71f42dbe78921e61 10.000000000000 233622 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 21.300862753125 xmr

key image 00: 87581e7821259848eab2dc7be4eef2eac3028c77cf15ba84e4e21ca902cead94 amount: 0.000862753125
ring members blk
- 00: 4f59ee6c2a68f024cc8ffc8fccc7cc64cfac991a7829deeca1fc1f3daeedf544 00170864
key image 01: 856e14f3b8ae84e35ddde17f6b4102b0d323bdb8b2079e4c58431af4d3141e81 amount: 0.500000000000
ring members blk
- 00: 17bd8b3d889cc2e1306c04b34570412757215ad6fdd76c00c63dc9b266c84384 00200961
key image 02: deb4dc11aa8c9fe2f8a1499904b9f6032493a47cc0b15cae0cfc8264a61425d0 amount: 10.000000000000
ring members blk
- 00: 0f9d97619c51c2bd32a0a69a9baeb6d8b68a61f2c47b1ff16b9d5aef36b576fd 00201301
key image 03: 8be595bdc2a354768b21ee4836750afe7bebbf1a60b3f271eb99c38bede8a352 amount: 0.800000000000
ring members blk
- 00: 166383401f731dec8b53a2cf8e1af376ebc4b49d8cafd0a08a2690cfc3b6fd07 00200603
key image 04: bf68f9637a57fa1f0ca07ba4e201f57ebcfd03752c050b4fd73c713897d727d4 amount: 10.000000000000
ring members blk
- 00: 097b7960e13f9b25ab315b3e1879151321b00a377f2df4725eb164b63f59fc00 00201593
More details
source code | moneroexplorer