Monero Transaction 012b87e665f799578a10e473a8b9202022c9aa5e0de652d8c14a188d971525b6

Autorefresh is OFF

Tx hash: 012b87e665f799578a10e473a8b9202022c9aa5e0de652d8c14a188d971525b6

Tx prefix hash: b821916ad9ed3c914eab223d6604081c216f91564be11be395e9f8b7885a696c
Tx public key: 5b56eeb7e49029831421c25570fde87056df64925ddc320a97cae629efdfb3fa
Payment id: 207df512977b718e744e487a5895aa1b70afb5f6221758ce75911bf3ea754de5

Transaction 012b87e665f799578a10e473a8b9202022c9aa5e0de652d8c14a188d971525b6 was carried out on the Monero network on 2016-12-02 17:32:01. The transaction has 2098850 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1480699921 Timestamp [UTC]: 2016-12-02 17:32:01 Age [y:d:h:m:s]: 07:363:02:44:48
Block: 1192665 Fee (per_kB): 0.010000000000 (0.013708165997) Tx size: 0.7295 kB
Tx version: 1 No of confirmations: 2098850 RingCT/type: no
Extra: 015b56eeb7e49029831421c25570fde87056df64925ddc320a97cae629efdfb3fa022100207df512977b718e744e487a5895aa1b70afb5f6221758ce75911bf3ea754de5de201db7dd6dd2792e20442b8875d1cdaf47d7ca88427bc44a4bdc86c69546795619

4 output(s) for total of 8.790000000000 xmr

stealth address amount amount idx tag
00: e7977c6a19bdef6a58131991fc9b3d0f964edc590e3d42c27670c8a469ed1d39 0.090000000000 287520 of 317822 -
01: 873cd2e078f347307dd1abc81f0d69b98dc5a03ff1b88a85382f13a74f2049cc 0.700000000000 497413 of 514467 -
02: c8d5d57f0a5154f464d19f590272d1caecfa19eda06b0bac9455a5c4fcff2f61 1.000000000000 840513 of 874629 -
03: 45589c62ca30926ae4b24cc6da8a61b3913ca4d89aa17394e3486fda55c2f2ad 7.000000000000 276322 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-18 21:07:14 till 2016-12-02 17:59:52; resolution: 5.11 days)

  • |_*_____________________________________*_________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________*____________*_________________________________________________________________________*|

2 inputs(s) for total of 8.800000000000 xmr

key image 00: fed7b646a999500cec04cbf28b3302223602031fbf6d8ea336de4d225d2fb04e amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6aa2f772112d48f1a57e88e3faecaed2692f13fea2a6cf8342f4c057ed096206 00134722 1 22/51 2014-07-18 22:07:14 10:135:22:09:35
- 01: 8e08fb0dfe3b5abe8a3e02da9ef1fa13b4c3e93a5900e8af7842887b1ce76851 00414278 0 0/4 2015-01-30 10:30:22 09:305:09:46:27
- 02: 91c5a9fda83fb01999fbb798c88a1b20727fee9e7deb062b488c8623304fd506 01192577 3 2/20 2016-12-02 15:07:11 07:363:05:09:38
key image 01: 6634093e3f04f0782d4375f50b841509c24095b7a9a81738dbe5bcb5387ffc67 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4d90d2c002d459247908cfc92d612e7d6d4f8de0f8a5d61cbc7f4080aad7f6e9 00734200 0 0/4 2015-09-11 04:10:46 09:081:16:06:03
- 01: 6d9019ea80c3aa0f199013713bd15cfde0a4b197f3652564f9f67d7c9a129461 00825293 0 0/3 2015-11-14 07:20:04 09:017:12:56:45
- 02: c6b14e10331235d1afce01e493ac951bbd2cd3f286756392fc644263659c21ff 01192646 3 1/24 2016-12-02 16:59:52 07:363:03:16:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 72021, 166897, 233379 ], "k_image": "fed7b646a999500cec04cbf28b3302223602031fbf6d8ea336de4d225d2fb04e" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 76092, 99986, 39854 ], "k_image": "6634093e3f04f0782d4375f50b841509c24095b7a9a81738dbe5bcb5387ffc67" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "e7977c6a19bdef6a58131991fc9b3d0f964edc590e3d42c27670c8a469ed1d39" } }, { "amount": 700000000000, "target": { "key": "873cd2e078f347307dd1abc81f0d69b98dc5a03ff1b88a85382f13a74f2049cc" } }, { "amount": 1000000000000, "target": { "key": "c8d5d57f0a5154f464d19f590272d1caecfa19eda06b0bac9455a5c4fcff2f61" } }, { "amount": 7000000000000, "target": { "key": "45589c62ca30926ae4b24cc6da8a61b3913ca4d89aa17394e3486fda55c2f2ad" } } ], "extra": [ 1, 91, 86, 238, 183, 228, 144, 41, 131, 20, 33, 194, 85, 112, 253, 232, 112, 86, 223, 100, 146, 93, 220, 50, 10, 151, 202, 230, 41, 239, 223, 179, 250, 2, 33, 0, 32, 125, 245, 18, 151, 123, 113, 142, 116, 78, 72, 122, 88, 149, 170, 27, 112, 175, 181, 246, 34, 23, 88, 206, 117, 145, 27, 243, 234, 117, 77, 229, 222, 32, 29, 183, 221, 109, 210, 121, 46, 32, 68, 43, 136, 117, 209, 205, 175, 71, 215, 202, 136, 66, 123, 196, 74, 75, 220, 134, 198, 149, 70, 121, 86, 25 ], "signatures": [ "e8ec4838b54bc629f2392b7e8af97963b47e4568926315a9970438380e97410e60632a6ab258b4a7bd16e5142ff238a6bba79a0fbe87b60691a7bcfd06684f0b48c51fb1775dc31173cd4e1ae26a8d85fde10552f078aca62c24d33d91350a0e685aa1aa8ddf255bba6e12056ea1b88d60f47c955e367f5eaec7b68f45c43104175dbe8adfeafc982cc477a947b1eea386b8e40bc0809e494a92546526ee7d0cba1d2397b17caf16065f3ef5b84cdb9f1b9753165579fd124b135a49ce755a06", "cd7b2cf561d00fafdbebb1ee3084d88a3e9799c247f20f2b03dc691a924e2f07ffa80532b479d371cbfdddfcd92c600b100fba66bd32dfdf0be09bde26b8d60f51da28d8b673916f82dbf6c5d6ada5712733412eef69620a3b9a32a8cbbf5d037301c645132dc35468fb92bf6bdf3fce9b56c8402dfc08242ab216465e45c40ccbab9fb2002924aa38af80c07672be46c4f629b4fcfdf6ecb1affdb0baf9080b11ec8431a70fa2d37daf12b6ee02f119de30079434a5787bc27d87acf5179101"] }


Less details
source code | moneroexplorer