Monero Transaction ffdc7ba7469755a0c49b72a4885a5fcecfbb0d9ebc725e146a144873f90071a2

Autorefresh is ON (10 s)

Tx hash: ffdc7ba7469755a0c49b72a4885a5fcecfbb0d9ebc725e146a144873f90071a2

Tx public key: e687021d4ab6607413b04dbbcf172c5fff11e2b25e3cc60594b216624f03dc14
Payment id: 29a5e27d190eac655aa1ac2c6f6ab30314c986156b02b32b378cc21cb2ce00f4

Transaction ffdc7ba7469755a0c49b72a4885a5fcecfbb0d9ebc725e146a144873f90071a2 was carried out on the Monero network on 2014-06-06 18:32:22. The transaction has 3220129 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1402079542 Timestamp [UTC]: 2014-06-06 18:32:22 Age [y:d:h:m:s]: 10:181:06:44:42
Block: 73683 Fee (per_kB): 0.000001000000 (0.000000762472) Tx size: 1.3115 kB
Tx version: 1 No of confirmations: 3220129 RingCT/type: no
Extra: 02210029a5e27d190eac655aa1ac2c6f6ab30314c986156b02b32b378cc21cb2ce00f401e687021d4ab6607413b04dbbcf172c5fff11e2b25e3cc60594b216624f03dc14

6 output(s) for total of 0.031133645978 xmr

stealth address amount amount idx tag
00: e1678b712aa6d7edb0a1828a466ca9d2aa771d5be474b0fa80e6dcc55f7371bd 0.000000645978 1 of 2 -
01: a71159b027961c053d5e614824c121e15fcae9c0751a0e39c621334b9e624d68 0.000003000000 13760 of 42341 -
02: aa8ad35b4887c0d943f5c7b9f986043ef09670ec5a292aefbc177eeecdfac639 0.000030000000 29018 of 59484 -
03: ac1bb155044b126430da2d083c0c9db58b62c97d17696c342f41a04466d1bab2 0.000100000000 29528 of 79261 -
04: c97866f77478459dd95af26299b8dd59d17e8663938ceab9521827c9ee212f26 0.001000000000 37509 of 100400 -
05: e1b7c54b812e365b5b417466cbfbf4cfaf20079f82e3c9a4450ae965bbe63792 0.030000000000 47358 of 324336 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



10 inputs(s) for total of 0.031134645978 xmr

key image 00: 2ba95191ac6c525740cbc80e8c5bec15fb983cfdab799656c6f4fc96df94dc7c amount: 0.000000645978
ring members blk
- 00: 0a5d4c1c7b236e93a0c53d5dfae10783f1dbbe164b9a00ae7ec6a384f8feec13 00073666
key image 01: 617d1dba067a04f9e0569f7e2da9c783724729037e7b95eed679ec429f61f395 amount: 0.030000000000
ring members blk
- 00: 2dc0c7a6b3c5eb0392f6b9b618147df500d867bd9c592ffbdcf3d2f125033de6 00073666
key image 02: 61483fc41ef1108fc3bf0874e72b36d11007c9a21bdc76d3fa1ef893bbd39a9a amount: 0.000007000000
ring members blk
- 00: ced248e26168956bdf5fa54346c3994c794ef97cf1a3ed43bf4bf87a5e5dd68a 00068796
key image 03: de6675d96277b4236e314a18ee5071d8b1f91d324211b7969be0d0ee498e76ab amount: 0.000090000000
ring members blk
- 00: 6022049d00fe93b88c8341df0252fcf73e988f0914be734c9d110a7d5a896212 00069161
key image 04: 56e4f30eaafc85dd8b8023b62fcb0afb7ab95fdb450ad193741da3867bdbb1cc amount: 0.000008000000
ring members blk
- 00: 40a9ac3f4b7eae53e691d0beded9469dc4c3c29f314ffc894ebbbc4ef3429725 00073666
key image 05: 9ba24a2458e6d92e8ac1ed9061d288175195aa6244ed06deb0e501afd869cc5a amount: 0.000300000000
ring members blk
- 00: 350121bc1f920e266e605f0782cbc2194b4f5f021f57b469405200c90a0ca810 00069161
key image 06: 0db7bf725d96eead0b2278bda012760c02f4a8ba00e2f194acfbed1338e965cc amount: 0.000600000000
ring members blk
- 00: b799326991a6f15f107364ea1034ad71693eb61e8919fa21e89a512b8cc515f4 00073666
key image 07: a5cf568acb374755c18f626e27a0631fea46efc7644b6cfebf1d07a12c2f33c7 amount: 0.000050000000
ring members blk
- 00: d9f5ac3be2fbb136be0945d7f05fb229b49f1b34bc5ec7baa1358929bc01c929 00073666
key image 08: 3f3deb0ec8b19ef598c71dd2138c9e485e3d4e16196161236770fa86cb3e0e7d amount: 0.000070000000
ring members blk
- 00: c7284c99c18538cb99f23f56854e14a0ab0fd2d9f9d17d2ca0e7637e7987a51a 00068796
key image 09: fed4e05852630c4a7339de6bde8b7242f69864a46fb77b48ef38f2ec219fd2c6 amount: 0.000009000000
ring members blk
- 00: 6654847b8be9d9d38c2bffb96281abaf26824683be05367bed585ba4c4e03d19 00069161
More details
source code | moneroexplorer