Monero Transaction 04d91f70a24687f8d36826f3a22c897b6c6a7b66770ce7eb29bbc0d8585b1d81

Autorefresh is OFF

Tx hash: 04d91f70a24687f8d36826f3a22c897b6c6a7b66770ce7eb29bbc0d8585b1d81

Tx prefix hash: 4df1660bcee5c553e353a7ec41f9e45668e320cc3c281e6de8c62ec6983ace2a
Tx public key: 19e31dd71d71397077df42a945b9239712eea4c86d772340f4b3acb37b2006b4
Payment id: 68bde04f665b4a7ca4d0cefdc67997aa321901b4bec6471496ded0f8309ee693

Transaction 04d91f70a24687f8d36826f3a22c897b6c6a7b66770ce7eb29bbc0d8585b1d81 was carried out on the Monero network on 2017-01-04 13:56:00. The transaction has 2086800 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1483538160 Timestamp [UTC]: 2017-01-04 13:56:00 Age [y:d:h:m:s]: 07:346:15:55:38
Block: 1216481 Fee (per_kB): 0.002000000000 (0.002730666667) Tx size: 0.7324 kB
Tx version: 1 No of confirmations: 2086800 RingCT/type: no
Extra: 02210068bde04f665b4a7ca4d0cefdc67997aa321901b4bec6471496ded0f8309ee6930119e31dd71d71397077df42a945b9239712eea4c86d772340f4b3acb37b2006b4

5 output(s) for total of 5.198000000000 xmr

stealth address amount amount idx tag
00: 80b085f09d30e3eed532b6a8245edab6c991dcca499500275c16bc6b95d1704b 0.008000000000 236032 of 245068 -
01: 0b3fc714fa3d26e7aa4e5b103f1536cac078c2e26614c0397e32392d694de6dc 0.090000000000 308467 of 317822 -
02: e68ea96e9546559e97e5ec2c9d7ac5a6a1da4d7b398f39344c51088f7f085c8b 0.100000000000 972562 of 982315 -
03: a5cb70cc4f78829639838cd7537da330583159093cc907a6588f9dc2a4d97968 1.000000000000 865431 of 874630 -
04: 67470647897ec268ed5074fc5c5ead7c1fb0ea5154252a6b8a49d435fee71c26 4.000000000000 234205 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-04 00:39:10 till 2017-01-04 14:11:57; resolution: 5.02 days)

  • |_*____________*__________________________________________________________________________________________________________________________________________________________*|
  • |_________________________*______________________________________________________________________________________________________________________________*________________*|

2 inputs(s) for total of 5.200000000000 xmr

key image 00: 2f7d43e72cb1989dcac33c1cae64740dd63cd26bf9754b30053b5584a207c83d amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4cb197d97df1ecd32ae940d4739586e7249033b0547e3ef9185c7c67d4882dbd 00202434 2 75/47 2014-09-04 01:39:10 10:105:04:12:28
- 01: 94a037f0921d63755fd096ddde99e045f6fe7b83d514536f2fe04e2bd775ed3e 00298435 1 46/187 2014-11-10 06:49:02 10:037:23:02:36
- 02: a75e4f7c3b051bb4b86348b51b326e475035519578468f853c717b305cd22f1d 01216458 3 5/4 2017-01-04 13:11:57 07:346:16:39:41
key image 01: aea71860ff35fbe1a7863232bbe38eccb9e453d79d04987ab6418fb32e952092 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5d47435e9fa89ebbdb506d39b533f7e9f92534e6bfabd0a3c56efb4b1850b576 00377138 1 3/4 2015-01-04 10:26:58 09:347:19:24:40
- 01: 52c9f370088c9fa5ee6dfd3e17d03e804d0a132f08381977a22a1f1b6e9cafbf 01153519 3 74/7 2016-10-09 08:05:36 08:068:21:46:02
- 02: c3e7dca05a9b58b8d2879c370fc02b552508d046db87ec03a82cca768892d430 01216406 3 1/6 2017-01-04 11:36:00 07:346:18:15:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 460731, 147671, 652786 ], "k_image": "2f7d43e72cb1989dcac33c1cae64740dd63cd26bf9754b30053b5584a207c83d" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 137430, 94378, 19818 ], "k_image": "aea71860ff35fbe1a7863232bbe38eccb9e453d79d04987ab6418fb32e952092" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "80b085f09d30e3eed532b6a8245edab6c991dcca499500275c16bc6b95d1704b" } }, { "amount": 90000000000, "target": { "key": "0b3fc714fa3d26e7aa4e5b103f1536cac078c2e26614c0397e32392d694de6dc" } }, { "amount": 100000000000, "target": { "key": "e68ea96e9546559e97e5ec2c9d7ac5a6a1da4d7b398f39344c51088f7f085c8b" } }, { "amount": 1000000000000, "target": { "key": "a5cb70cc4f78829639838cd7537da330583159093cc907a6588f9dc2a4d97968" } }, { "amount": 4000000000000, "target": { "key": "67470647897ec268ed5074fc5c5ead7c1fb0ea5154252a6b8a49d435fee71c26" } } ], "extra": [ 2, 33, 0, 104, 189, 224, 79, 102, 91, 74, 124, 164, 208, 206, 253, 198, 121, 151, 170, 50, 25, 1, 180, 190, 198, 71, 20, 150, 222, 208, 248, 48, 158, 230, 147, 1, 25, 227, 29, 215, 29, 113, 57, 112, 119, 223, 66, 169, 69, 185, 35, 151, 18, 238, 164, 200, 109, 119, 35, 64, 244, 179, 172, 179, 123, 32, 6, 180 ], "signatures": [ "217fe6ce6ebacf14f7920e67f3bc79c053fa18a9bcb0dab0603b2637df8f07003a46db2d0567391a03c713c324b3e0992ef61757b07546494eee71c91093dd009d1695ba5a16abd22490e404b4fca1fe807c26ed84f7a8671e32b06490e9050e754fd47b8b5e40ffb53f3f001ffaa7047ceb0711d47f932c43a7f580e92124002e1fc01cff1a840376d3409ef4af348b7231f4c2250b033083304db557d77b0a471a38f4652443297ea7222c81deb9b6c9bbad7a8320a81f441b7dd86d1ec402", "9308a2d0fe398dcf3ea1c08de4a3f1f630e50a7b43c1ec32d4d6810fbe1772096e2879c801efcd05fe9cc53de7d618bbc4af687e4755d8b17438aaa4e4b101048fbd472c28580fb81f0f097022975ed422e6713e371978251a561f459f2263069fb9315e1ee990d7715fbfde5438d85fde08b0d2fe17f48754a22d46943b67060b7ef74b71975d7acf86bb27434a8c5ab4b49e61d1e6a17a62f19f03ade3c50f1938ef9285e38509eba4f501efdfa0da4ca1fc5e93f4d6bedbb9d5c7c3fcdd0d"] }


Less details
source code | moneroexplorer