Monero Transaction 02164065d41ca93405b4d58de01c33be4d394e729c47a84ae2630a25a869ba0e

Autorefresh is OFF

Tx hash: 02164065d41ca93405b4d58de01c33be4d394e729c47a84ae2630a25a869ba0e

Tx prefix hash: 92b9ae5b1a150b94a4232c998346a4eb820868036a4d3e751e4bc047219a6f35
Tx public key: b4d827a849b52921dbc0293790fb03049a820908a278b6db1cb3a16896c5b963
Payment id: f284760b5311cb66c96ddb737cc0762e5313b554f9a6739b3472ea3784f55dff

Transaction 02164065d41ca93405b4d58de01c33be4d394e729c47a84ae2630a25a869ba0e was carried out on the Monero network on 2016-09-06 06:39:20. The transaction has 2162563 confirmations. Total output fee is 0.025000000000 XMR.

Timestamp: 1473143960 Timestamp [UTC]: 2016-09-06 06:39:20 Age [y:d:h:m:s]: 08:086:18:51:54
Block: 1129835 Fee (per_kB): 0.025000000000 (0.021566975569) Tx size: 1.1592 kB
Tx version: 1 No of confirmations: 2162563 RingCT/type: no
Extra: 022100f284760b5311cb66c96ddb737cc0762e5313b554f9a6739b3472ea3784f55dff01b4d827a849b52921dbc0293790fb03049a820908a278b6db1cb3a16896c5b963

5 output(s) for total of 1.225000000000 xmr

stealth address amount amount idx tag
00: 6f27bf2d831ae1fe8902b42b8190bda2a4ecb5d263225bdf6c4190ef2c83a6e4 0.005000000000 271085 of 308585 -
01: 29d9a610bbd9175ef57931d23bb43760cc00a3431e4805e6cba662aef38d1f80 0.010000000000 454526 of 502466 -
02: 7c984937663ce6a0e3c92b5f5724ba37024ceba2148df88153f6c5a6f8f2e144 0.010000000000 454527 of 502466 -
03: 8beae60b8fc058be42114099220fd4b635e0090a72f407deb134d772d78d94cd 0.200000000000 1160486 of 1272210 -
04: 3185a3a9d2503757771108a92349b84ef5aee01ccc8a6bd9cb567801df72d139 1.000000000000 789979 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-20 00:04:20 till 2016-09-05 20:32:41; resolution: 5.12 days)

  • |_*_________*__________________________________________________________________________________________________________________________________*__________________________*|
  • |________________________*__*_______*_____________________________________________________________________________________________________________________________________*|
  • |______________*_____________**___________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 1.250000000000 xmr

key image 00: fb254e37e0c0da610f0b1b0a1315bafb304da3ef12dd9b1ef68c076badbac731 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0c6b382b967c0ceb45d63a00b597059340dcce6f682107e13620d392f4f433c5 00002357 0 0/8 2014-04-20 01:04:20 10:227:00:26:54
- 01: fecd24c7172f958b6345aa612fcd90680635665ff3feede2447d60c8057f9554 00083982 1 10/128 2014-06-13 21:04:00 10:172:04:27:14
- 02: 898abb977c8fd96d2b0a01f29b0f12efd3ba0ae0528f467f455333592673cc1b 01025846 3 2/22 2016-04-15 00:58:11 08:231:00:33:03
- 03: aeb7de5fdcc95a43ca5f58572c26638dd1ef6125df3e915ac3cc96454d777abe 01129157 7 5/5 2016-09-05 07:15:35 08:087:18:15:39
key image 01: 87c355f6695de6cbc74c485afbdcccf1a8b62b1c66f13732f42d06d76e43f130 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 464111bb60866d2b2615ba68588bacd1878267f546815de374601846186a7d6a 00178184 4 4/49 2014-08-18 04:41:22 10:106:20:49:52
- 01: c7c1a1988f84d0a179392d04ccf5bdc100ab6a7cbd440c44689ac283968d4b66 00202365 2 72/46 2014-09-04 00:14:42 10:090:01:16:32
- 02: f3198550be4e8562746bf0ebfeb3b88086e6ec4e83a55e7506391d76d5ad15f3 00260591 1 4/100 2014-10-14 15:06:53 10:049:10:24:21
- 03: 55dd8bfbc7ad6ea102dffe87435041af08c15b92a7f68e12e4e16bb22e725d26 01129276 3 52/144 2016-09-05 11:03:28 08:087:14:27:46
key image 02: 25a8b36f388bd0412694d6bed0b3dbe5beba0e99a70b4d029fb19f146ef5110c amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f2e245bba169a53ac737d4b147d74c13c251824af8fdf26f55e8415f2c009105 00107015 1 21/68 2014-06-29 16:51:38 10:156:08:39:36
- 01: f3bd21994dfaf9daae8f59f336662ed852184320cf99500f9a1a8b7b66ae887e 00209921 1 53/248 2014-09-09 06:23:15 10:084:19:07:59
- 02: 639599a6a57b44cbb772201812e202ca5fe1562896c49408c87844caf1e7232b 00219155 0 0/4 2014-09-15 15:49:28 10:078:09:41:46
- 03: 102037e04725dfc6b78a5bd10ab6cedcbcd1cc0717b37df08f2773cc1e21f44f 01129544 3 46/128 2016-09-05 19:32:41 08:087:05:58:33
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000, "key_offsets": [ 434, 61283, 157679, 20234 ], "k_image": "fb254e37e0c0da610f0b1b0a1315bafb304da3ef12dd9b1ef68c076badbac731" } }, { "key": { "amount": 800000000000, "key_offsets": [ 118634, 26466, 36136, 259166 ], "k_image": "87c355f6695de6cbc74c485afbdcccf1a8b62b1c66f13732f42d06d76e43f130" } }, { "key": { "amount": 400000000000, "key_offsets": [ 53903, 146500, 12423, 394909 ], "k_image": "25a8b36f388bd0412694d6bed0b3dbe5beba0e99a70b4d029fb19f146ef5110c" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "6f27bf2d831ae1fe8902b42b8190bda2a4ecb5d263225bdf6c4190ef2c83a6e4" } }, { "amount": 10000000000, "target": { "key": "29d9a610bbd9175ef57931d23bb43760cc00a3431e4805e6cba662aef38d1f80" } }, { "amount": 10000000000, "target": { "key": "7c984937663ce6a0e3c92b5f5724ba37024ceba2148df88153f6c5a6f8f2e144" } }, { "amount": 200000000000, "target": { "key": "8beae60b8fc058be42114099220fd4b635e0090a72f407deb134d772d78d94cd" } }, { "amount": 1000000000000, "target": { "key": "3185a3a9d2503757771108a92349b84ef5aee01ccc8a6bd9cb567801df72d139" } } ], "extra": [ 2, 33, 0, 242, 132, 118, 11, 83, 17, 203, 102, 201, 109, 219, 115, 124, 192, 118, 46, 83, 19, 181, 84, 249, 166, 115, 155, 52, 114, 234, 55, 132, 245, 93, 255, 1, 180, 216, 39, 168, 73, 181, 41, 33, 219, 192, 41, 55, 144, 251, 3, 4, 154, 130, 9, 8, 162, 120, 182, 219, 28, 179, 161, 104, 150, 197, 185, 99 ], "signatures": [ "cfbc522ad1a115ebd28324283b76d0ea53a4020e82e9554eeb6255d48ab6410fc3b9b64ed9b14dfd20c2b80542fa3807ffe9864d65106a2d160bb1c595ba360ecea9bda6ef066746b04b1c5d124a90495d15ea8df2f1bb4202967d86199f6f0a080c9c884c3506f6ee5a3d52882f61f4f123a6a857365b020c029f573fd60b09d454174ecffba74429855fba3e1023daf7c23b00b672397b46c61fe79f6cef0c6164b865b3d747d7b241b6423a1a066c0737fe91d7d8daa068d79610e30e590229201b01f63f6b255cb18133b8952e476b625177346ee88f6a502d2114ca4f0088fbe7b0779df7f51a4486accdfaa5721a28efdfe81a9b71bf7b5908f0e05507", "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", "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"] }


Less details
source code | moneroexplorer