Monero Transaction 00f16dcd7ef454a6e608b3f4ceb48dd2c4fb85a5fd0f51a500c5f98b91d65c3d

Autorefresh is OFF

Tx hash: 00f16dcd7ef454a6e608b3f4ceb48dd2c4fb85a5fd0f51a500c5f98b91d65c3d

Tx prefix hash: 39a10d3754576c4c9ebe34eafc6d87dd7811f58beed4eed8a081a1583e21012a
Tx public key: 6ba27e635f467be41abfd93a0c2b868c0ccdae9f1332d68c2f87386ff1ebbe6e
Payment id: ab67be05d51166480480f9e1557cb5e5c7ad66a5ffd0a10af65b745e95dd45d9

Transaction 00f16dcd7ef454a6e608b3f4ceb48dd2c4fb85a5fd0f51a500c5f98b91d65c3d was carried out on the Monero network on 2014-09-05 13:03:23. The transaction has 3096838 confirmations. Total output fee is 0.189474223432 XMR.

Timestamp: 1409922203 Timestamp [UTC]: 2014-09-05 13:03:23 Age [y:d:h:m:s]: 10:101:03:18:50
Block: 204610 Fee (per_kB): 0.189474223432 (0.352766554172) Tx size: 0.5371 kB
Tx version: 1 No of confirmations: 3096838 RingCT/type: no
Extra: 022100ab67be05d51166480480f9e1557cb5e5c7ad66a5ffd0a10af65b745e95dd45d9016ba27e635f467be41abfd93a0c2b868c0ccdae9f1332d68c2f87386ff1ebbe6e

4 output(s) for total of 15.811875810000 xmr

stealth address amount amount idx tag
00: 819c7fb81661b1e06a7db34454e5f7b29734c237dab4e6eb8f41f1915d883af2 0.011875810000 0 of 1 -
01: e68efe17de3de7b44c07731c8b60874c7e3ba539f52f196395dd9dd6f8891e98 0.800000000000 146734 of 489955 -
02: 67c8ebda341b342bbabf1211e3413f530fa30eeac2798ed7de5f8dcaf61f7b7a 5.000000000000 111305 of 255089 -
03: f8503790430941884899febec79304d1b28f164ee5a5aacbe215e886870d98ad 10.000000000000 237051 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-23 18:25:45 till 2014-09-04 09:40:51; resolution: 0.25 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 16.001350033432 xmr

key image 00: dd52d38fb181b62af0f7ed3038987687f681e28144359a71326fcc0d8e3f56bd amount: 0.001350033432
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 194baff18ae755ebef730e34b904d0dc01fa40b30511f7ae1f07af20714504af 00141783 0 0/4 2014-07-23 19:25:45 10:144:20:56:28
key image 01: 4b6e0cb0f7dd4516e0365e2479951468cc89b014fec515941c1769fb074dad42 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 82ec815a226275df93ec689e02f0f85567a6a006ff0ee91805e61b297644d125 00202036 1 6/4 2014-09-03 17:30:27 10:102:22:51:46
key image 02: 73281319c742f16a7c467ffcb83cc8861abfdc8dafe9f27f0fe2e108feae26dc amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: edd63d6d4eb4c1fcd62748b08a9be5a71670a7f5c1769f8ebcf5074d36611aef 00202878 0 0/4 2014-09-04 08:40:51 10:102:07:41:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1350033432, "key_offsets": [ 0 ], "k_image": "dd52d38fb181b62af0f7ed3038987687f681e28144359a71326fcc0d8e3f56bd" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 79564 ], "k_image": "4b6e0cb0f7dd4516e0365e2479951468cc89b014fec515941c1769fb074dad42" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 235063 ], "k_image": "73281319c742f16a7c467ffcb83cc8861abfdc8dafe9f27f0fe2e108feae26dc" } } ], "vout": [ { "amount": 11875810000, "target": { "key": "819c7fb81661b1e06a7db34454e5f7b29734c237dab4e6eb8f41f1915d883af2" } }, { "amount": 800000000000, "target": { "key": "e68efe17de3de7b44c07731c8b60874c7e3ba539f52f196395dd9dd6f8891e98" } }, { "amount": 5000000000000, "target": { "key": "67c8ebda341b342bbabf1211e3413f530fa30eeac2798ed7de5f8dcaf61f7b7a" } }, { "amount": 10000000000000, "target": { "key": "f8503790430941884899febec79304d1b28f164ee5a5aacbe215e886870d98ad" } } ], "extra": [ 2, 33, 0, 171, 103, 190, 5, 213, 17, 102, 72, 4, 128, 249, 225, 85, 124, 181, 229, 199, 173, 102, 165, 255, 208, 161, 10, 246, 91, 116, 94, 149, 221, 69, 217, 1, 107, 162, 126, 99, 95, 70, 123, 228, 26, 191, 217, 58, 12, 43, 134, 140, 12, 205, 174, 159, 19, 50, 214, 140, 47, 135, 56, 111, 241, 235, 190, 110 ], "signatures": [ "332a43d136af1abde079d60bb4f1f7ea39c2e67cc34a6613c8d58d1f9c7deb01b33302c9fe1d797eb49f8beee7048abb073d2184a2e8f5acfe91760672066a0b", "7d819c9bd4878c205dbec425ce1ebb976fdc98e5f7513e2dbd1bfb8fe5537000ad4d068e0f1dd18dc0e954c5f78082a3a5f9edba20e599c881c2b8e84d1c9b09", "7d5283dc15b6bb906e66abaa7b46524d152f1fd80e2b2d0b3006db53660866070dc468167c1b2ac0c56d04eae359358159f47e8abc7ad32db5cc37806efbc209"] }


Less details
source code | moneroexplorer