Monero Transaction fd3fc1a1a58fd5f51583e73266563713c6cbff4724a0b30a6705eb0a79af4f04

Autorefresh is OFF

Tx hash: fd3fc1a1a58fd5f51583e73266563713c6cbff4724a0b30a6705eb0a79af4f04

Tx public key: bac7edcbca2b79e52a7f02fddcdeed1131b78936ddad1e708228db925821bdfe

Transaction fd3fc1a1a58fd5f51583e73266563713c6cbff4724a0b30a6705eb0a79af4f04 was carried out on the Monero network on 2014-08-29 09:14:46. The transaction has 3096809 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1409303686 Timestamp [UTC]: 2014-08-29 09:14:46 Age [y:d:h:m:s]: 10:094:00:23:48
Block: 194363 Fee (per_kB): 0.100000000000 (0.077634571645) Tx size: 1.2881 kB
Tx version: 1 No of confirmations: 3096809 RingCT/type: no
Extra: 01bac7edcbca2b79e52a7f02fddcdeed1131b78936ddad1e708228db925821bdfe

17 output(s) for total of 19.900000000000 xmr

stealth address amount amount idx tag
00: 29607e0c1e6c57681a5f92a3b671777b0490ba4fc5a2b2837297bce0105e2312 0.900000000000 106875 of 454894 -
01: af26b7c356098f9da456893dcd361e160baf1bffd7dd38547a581df3ac423c2c 1.000000000000 223803 of 874629 -
02: 3a06f2ba1ccd40eb743db4435ca34dd6b2ea134c6524a39ac126e1f0aed05c96 1.000000000000 223804 of 874629 -
03: 9c95f4d94514d14be40364e4ed0bef68ad17e667a10c2b7f4f51789e2e4c6b69 1.000000000000 223805 of 874629 -
04: d3b6d5dfba547141465a796c0138cfd666d497c6a56a62d5604be7a43a23591f 1.000000000000 223806 of 874629 -
05: 360cfa9afb4b6dcafeee419767da827fde3428684b5ea2fd4b5b00d83e0d8868 1.000000000000 223807 of 874629 -
06: c04464a62a1ef19332c6dfe2c609899d97db49bf220b12f860add100b5cda477 1.000000000000 223808 of 874629 -
07: 64095022e120bd6e341a594594835a3e44e6c4fe3475664fec043cb14215a204 1.000000000000 223809 of 874629 -
08: 444606a9c0f600dc91704cd9c076ffe746f49fa5ad3c46490dda0c2dc385d42d 1.000000000000 223810 of 874629 -
09: 94ee595f2a88b7de2a8bb56f2990712a9ce64c27d7221043274c8bb70841dbb6 1.000000000000 223811 of 874629 -
10: b050ee9a9460000938119786075a18d62c925ef1e35bdec775c59da4741dfb38 1.000000000000 223812 of 874629 -
11: 40f0753d0fd097697598bda97f10ebdf03de726369a067aae771d1a01ebd7bd0 1.000000000000 223813 of 874629 -
12: 73a3989f044bf494754014c573b45e8325f834f7cad1492f75e7d8607d384912 1.000000000000 223814 of 874629 -
13: 0cb84d818c930a36abdd51d599b270d0a390ebd84b971e71d7aeb7780b123954 1.000000000000 223815 of 874629 -
14: 9fb119caf351efafb79d3461a7158da1b2b856cf58dfacfa3ec9bf353fba9895 2.000000000000 86924 of 434057 -
15: fe4990052fe9f2f600645203b4f1dd1b78969a2a972b4b3337097c88fa1fb826 2.000000000000 86925 of 434057 -
16: 72174bfb281004a2f33738219bc9f4eb2a649d521354d9cca12a1e5afa554fc7 2.000000000000 86926 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 20.000000000000 xmr

key image 00: 3d9b8487fae71b3f0ce7ff6fe9c6b7bb3847172f169513f3c75ca2ce2e52a306 amount: 10.000000000000
ring members blk
- 00: 18959e51e8bf0fcb1ab479be971401a0f8fc81ac7b5f782db3bfc340cd8ce234 00079468
- 01: f7b4b1a965b39fc7941d02a85c37113b8f9dca5090f225fe3b327ccd74c0bcb4 00094038
- 02: bc819f0f7fde3f5ff5dcca7c8badc79ab6b3df03d1bba1c4ea9346fb574473bf 00115050
- 03: 5039e6e449e8099441f89a9ec876c7f32d4fb19f0dddd183c17e5fdcd1808c8a 00194291
key image 01: 226dae57aa8bddf1d6b7f97eab2e12610e672e6501c5d8d1eaf91707a20f5260 amount: 10.000000000000
ring members blk
- 00: 6e5505f4133e9ee8e74a5bc19ae5e38273d87709bfff63441c4bd6a865238411 00122618
- 01: 04f7559b8396032beb5a76a937ae26a17bf0bcd0cd1d71513e9996418f739443 00138628
- 02: c4d63da1eb683a64e8a393be34f1ec977c0f26bf3586f475b41b2c72bc582f9b 00157159
- 03: 25482c189c407691babc64441b8c46778cbd55cccd4363d8910f0978cbaf1651 00189743
More details
source code | moneroexplorer