Monero Transaction dfa134b039696006ca067b0ec1d49a2baca5554e97e7e3a461ff48b008b8b168

Autorefresh is OFF

Tx hash: dfa134b039696006ca067b0ec1d49a2baca5554e97e7e3a461ff48b008b8b168

Tx public key: 817ad9b675088006efdc052fa0ef8a9cd687eecfbf4e676f13a4a2da3b210f5e

Transaction dfa134b039696006ca067b0ec1d49a2baca5554e97e7e3a461ff48b008b8b168 was carried out on the Monero network on 2016-06-05 22:17:56. The transaction has 2224464 confirmations. Total output fee is 0.055395150000 XMR.

Timestamp: 1465165076 Timestamp [UTC]: 2016-06-05 22:17:56 Age [y:d:h:m:s]: 08:172:15:05:25
Block: 1063236 Fee (per_kB): 0.055395150000 (0.049627850919) Tx size: 1.1162 kB
Tx version: 1 No of confirmations: 2224464 RingCT/type: no
Extra: 01817ad9b675088006efdc052fa0ef8a9cd687eecfbf4e676f13a4a2da3b210f5e

10 output(s) for total of 12.744604850000 xmr

stealth address amount amount idx tag
00: 9bdba011867241d9b91c2f2df3821abd60a330d3971da0136fc95aa2e277ea3f 0.000000050000 2707 of 22583 -
01: ab9a9c7dc739cc1f921440271caf7908ff6cf862d4bd27ce0fb6ad8126b89e88 0.000000800000 2628 of 22876 -
02: 6bc4af0362ce57e1c2975130afe0b1c26e05c7581aacec6778c2698836b81380 0.000004000000 21105 of 41587 -
03: 785e39024aec7ec43d7c1b6900c6363ae3b97279843b9e11342c9cc7c24770cb 0.000600000000 42970 of 77842 -
04: 85cedceb2527635711d357864cabd381f1a83b8979d3b7fd645dd83f8dd5a3dc 0.004000000000 43657 of 89181 -
05: 751356d937ed85a9966fed77288358cf788f1fd66f560377c09505b95fde2e66 0.040000000000 238162 of 294095 -
06: fc0c1bf517c993d82479d8ac962507a949ad3376659810bae2d60f528caaf5d0 0.100000000000 889800 of 982315 -
07: cd49ac59017d8e8c839acdd1457bcf911e01fa01e2bacc6dc86ca7288b625af8 0.600000000000 575386 of 650760 -
08: 9b19045c7f3f70b79944d19af7d0f049e01e12501d48b4042325c351e54de8e9 2.000000000000 371133 of 434057 -
09: 98355b8168d026b1ed6c88df7e3f20cc51fae0682030064dbfdeaf059aab7ed0 10.000000000000 774349 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 12.800000000000 xmr

key image 00: 2a92dd3bb6bc42310df5fcf74a91a5c47a33758b68ac923ca7e2b7665d24b3c3 amount: 10.000000000000
ring members blk
- 00: 1f755d641f5502cbf33f0e974d4d08ac31a8739d0f8b6975952c810e83992a64 00438237
- 01: e0d847cdd81387023ef43d770eaedd56dd0c2e1e04f554af46f69b3dea2ee2ca 00469407
- 02: a5bb77af6dfda0713bd6ca29951bbaed1e457f3b9fddf2c4b6a86da37e30a1e9 01058605
key image 01: 3043e4b54eb847b5ae218bafb655288fa14edffa923a34780132e8fd82a5824f amount: 0.800000000000
ring members blk
- 00: 56a3496ae91dfe024d194ad693327567ab6e188065474f80a4dd5b9db5bac40d 00144915
- 01: 7488fa705700949980c3d058bc73b603d94efbb74a7f1b2b888b656564bd1230 00304462
- 02: 1f24c4cb1ec4acfc610856930c0e00f779786a25adcfd656bb6ccb77df1365ad 01060337
key image 02: a24989749c4bc2ec1a3e82651d63263d794f47a36edb08c26d3ea04618dc9a86 amount: 2.000000000000
ring members blk
- 00: dffa50e54f8a20172c49a8b628626a93e5785fdcebf86065fe4555fbc83bbb03 00399541
- 01: 66358732ae71577da22db8284bd965a6a8d1faf0dc69b1726c28f9f133db0b0a 00506306
- 02: bc02d6d7fd8ba615bdc37bc82cca6acbb32764829abceacde700ef1b8a294610 01061920
More details
source code | moneroexplorer