Monero Transaction dfdbf1a8fa83c30046730054f066b4a8501489b8100ddca1e3bf013d4913be40

Autorefresh is OFF

Tx hash: dfdbf1a8fa83c30046730054f066b4a8501489b8100ddca1e3bf013d4913be40

Tx public key: 2d4a5e8167285726f53f8861f0c0797a28277da12e1f1853f5761c50736092f1
Payment id: 4520f9d968449e1edbe9ce1641e4bc7f51f715dd0beee4860ca6020b4e37f094

Transaction dfdbf1a8fa83c30046730054f066b4a8501489b8100ddca1e3bf013d4913be40 was carried out on the Monero network on 2016-12-17 18:26:52. The transaction has 2088281 confirmations. Total output fee is 0.004600000000 XMR.

Timestamp: 1481999212 Timestamp [UTC]: 2016-12-17 18:26:52 Age [y:d:h:m:s]: 07:348:12:51:22
Block: 1203573 Fee (per_kB): 0.004600000000 (0.004266666667) Tx size: 1.0781 kB
Tx version: 1 No of confirmations: 2088281 RingCT/type: no
Extra: 0221004520f9d968449e1edbe9ce1641e4bc7f51f715dd0beee4860ca6020b4e37f094012d4a5e8167285726f53f8861f0c0797a28277da12e1f1853f5761c50736092f1

8 output(s) for total of 2.295400000000 xmr

stealth address amount amount idx tag
00: e096ab652c7600033e750a192df6268867e56cc09668d99673d9a8baea835c4d 0.000400000000 68021 of 77134 -
01: a775aad7fc9f1429aa50b5f3322da202141074548c4d01bd2328293c53cfd8e4 0.007000000000 233325 of 247340 -
02: 5b7888f1dd70b77ad02a632633a921de8d70ac1000a004361f447fed8f31f81b 0.008000000000 225644 of 245068 -
03: 4f94ddf0079938fa280a8624fcfbd10a5dae3f0507428ee71bef5b1409559213 0.010000000000 484179 of 502466 -
04: 180f74a5980f8f273248e3e531b14dc0cbeaca6c78218b81382501f44f43216b 0.070000000000 249218 of 263947 -
05: cf93879a4937a9762fb65b9412d076c7ca1b12b3a2dd458e5c57dc2f43755c7d 0.600000000000 637129 of 650760 -
06: 932351e5167163aa6142c01bd7d5b11bc28176e1c08b5ea616c4d43146eb0915 0.600000000000 637130 of 650760 -
07: e682d760d531ae952065d929e9a0827875eb66cda6ed7031312bc649456ab728 1.000000000000 848505 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 2.300000000000 xmr

key image 00: 5fa0f2d2c02e14d0432b139317a4e2fc2eb7c9ae35a4db9da2e5cc9c9a23f879 amount: 0.400000000000
ring members blk
- 00: 466860ce94e8a156a61fae645ce296d54b07d6858228fc0da80251b12222d02e 00189226
- 01: 8b412b01b1d395bbcc429fddf9a2741125f7e0f29291c97c9f884c071d31beed 00207826
- 02: e7a2161440fec7af535e2edaf924acd4ae57c1502d5e57aee00bae09a4fff856 01203476
key image 01: 8d9318298506735cd1a3ffb9e2238f84e4dd02a7d1fc7ec5a360cecf6548055d amount: 0.900000000000
ring members blk
- 00: 9f7b116c83bceee676de454fd06ad1a9658b3af331589ac664b23e439f86ecdf 01121998
- 01: 7a471e9511b0834ba62d1f6d5120a63a1c4666eaece4f660be1f95e540daa21e 01157564
- 02: 18db0a1c3415152969343587e17d17c7c30023e1b0473f4ca52207475d2bb842 01203487
key image 02: f7d72e3c09230d1a2a10e7f81117c49fa8ccc227d713b359f84d3d45922628a1 amount: 1.000000000000
ring members blk
- 00: f178de4a60ba8e0693e0e78f99fca41994cb2b1468b28a95cabde0ec69f3ce37 00479128
- 01: 3aaf8fcfa72f49f3921cdee80b239f53be22cc7deb88080ab2fbccb98b3612a3 00883565
- 02: ab32e761575db46e605e1d42e9dc62aa13706258bcfed04f2bb33bcf7d75e4be 01203484
More details
source code | moneroexplorer