Monero Transaction 064a25536c4accb4264c5ff47cb38ab5a29319fd53cd88f2557b952dccc8f807

Autorefresh is OFF

Tx hash: 064a25536c4accb4264c5ff47cb38ab5a29319fd53cd88f2557b952dccc8f807

Tx prefix hash: 9c939c98795ce8e88f65a67faae428dc58f5c1354ecc1dba3ef5fc9d58126b59
Tx public key: 60c2f0f9621d2fc4f34c10960becacddccd989c47c0003bf95e8a2c2e14fb4f1
Payment id: 6ec963f1cba9f9f255c0e22f3a6b376782dfda6049ca24a185f44c3a4090f033

Transaction 064a25536c4accb4264c5ff47cb38ab5a29319fd53cd88f2557b952dccc8f807 was carried out on the Monero network on 2014-09-19 19:26:46. The transaction has 3086031 confirmations. Total output fee is 0.122955804671 XMR.

Timestamp: 1411154806 Timestamp [UTC]: 2014-09-19 19:26:46 Age [y:d:h:m:s]: 10:100:07:40:47
Block: 225072 Fee (per_kB): 0.122955804671 (0.156990952597) Tx size: 0.7832 kB
Tx version: 1 No of confirmations: 3086031 RingCT/type: no
Extra: 0221006ec963f1cba9f9f255c0e22f3a6b376782dfda6049ca24a185f44c3a4090f0330160c2f0f9621d2fc4f34c10960becacddccd989c47c0003bf95e8a2c2e14fb4f1

5 output(s) for total of 18.703879580000 xmr

stealth address amount amount idx tag
00: ec80b9ad189239966b490985e1d9a4d7e888a89c9270bb3cf1152d8c0fba2f1e 0.003879580000 0 of 1 -
01: b31ca54500db06296e53b252923a41743f77f2ba5941330f1dee57c54ce6e600 0.300000000000 243560 of 976536 -
02: 558c9bf0f1932d5e91ebce7831f5cb40aef7d49d3da13284a17425ff5839a430 0.400000000000 219144 of 688584 -
03: fab23f5310267044fd7ea526ddef7dc2b7cf46ba67fcb52c2265d4e5f57a1451 8.000000000000 18937 of 226902 -
04: dee433a83200adb7b1e7b1348bc0ec264b3a24dd090cf20a3e0758e0a655a746 10.000000000000 261639 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-14 22:19:15 till 2014-09-19 19:12:24; resolution: 0.03 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

5 inputs(s) for total of 18.826835384671 xmr

key image 00: 18690b3869541f3a817334caff9ed218783b4dc8b99051c988ab0d966c6a4440 amount: 0.026835384671
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a53e25a21cdf52fd74c3f8e39cb90cac9503d56122569f663f1cb9f2d87e7248 00218164 0 0/4 2014-09-14 23:19:15 10:105:03:48:18
key image 01: 03960accf995a86f4004a132509c98cd318f9b6c7d572eeb8e444328756397f1 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9a3b01eb77aea363be6971ce03ad882aa9a0554617b8249fc9999bcfdb1b8181 00224756 0 0/4 2014-09-19 14:38:25 10:100:12:29:08
key image 02: 50ea93a72b0e6d0827e5648ec2bc71c1623c1b1c155c6dcf36d9317e5e1acdde amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e207d4589ebe9e1358cec4d604c1677ccdf56aec6387e82535bafa57b05fcc85 00224864 1 12/5 2014-09-19 16:09:38 10:100:10:57:55
key image 03: acda576e3d8e82813430b7268ea4b910dd30d608190f774ee6110e5926fd0006 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8fc95990971273bd7d143f8ae5782da4121819ee953f701e0d664653fa2f09b8 00224759 0 0/4 2014-09-19 14:41:18 10:100:12:26:15
key image 04: 7bbd4c9817af046beb101121850bcaa6ae1b32016c6b231a66aeb8a8cc76ff34 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 80df12301ea3374f92e72b70ad169819ae6d63cf7b24dc18de7f31befeafaa2a 00225000 0 0/4 2014-09-19 18:12:24 10:100:08:55:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 26835384671, "key_offsets": [ 0 ], "k_image": "18690b3869541f3a817334caff9ed218783b4dc8b99051c988ab0d966c6a4440" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 261267 ], "k_image": "03960accf995a86f4004a132509c98cd318f9b6c7d572eeb8e444328756397f1" } }, { "key": { "amount": 800000000000, "key_offsets": [ 159462 ], "k_image": "50ea93a72b0e6d0827e5648ec2bc71c1623c1b1c155c6dcf36d9317e5e1acdde" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 99999 ], "k_image": "acda576e3d8e82813430b7268ea4b910dd30d608190f774ee6110e5926fd0006" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 100277 ], "k_image": "7bbd4c9817af046beb101121850bcaa6ae1b32016c6b231a66aeb8a8cc76ff34" } } ], "vout": [ { "amount": 3879580000, "target": { "key": "ec80b9ad189239966b490985e1d9a4d7e888a89c9270bb3cf1152d8c0fba2f1e" } }, { "amount": 300000000000, "target": { "key": "b31ca54500db06296e53b252923a41743f77f2ba5941330f1dee57c54ce6e600" } }, { "amount": 400000000000, "target": { "key": "558c9bf0f1932d5e91ebce7831f5cb40aef7d49d3da13284a17425ff5839a430" } }, { "amount": 8000000000000, "target": { "key": "fab23f5310267044fd7ea526ddef7dc2b7cf46ba67fcb52c2265d4e5f57a1451" } }, { "amount": 10000000000000, "target": { "key": "dee433a83200adb7b1e7b1348bc0ec264b3a24dd090cf20a3e0758e0a655a746" } } ], "extra": [ 2, 33, 0, 110, 201, 99, 241, 203, 169, 249, 242, 85, 192, 226, 47, 58, 107, 55, 103, 130, 223, 218, 96, 73, 202, 36, 161, 133, 244, 76, 58, 64, 144, 240, 51, 1, 96, 194, 240, 249, 98, 29, 47, 196, 243, 76, 16, 150, 11, 236, 172, 221, 204, 217, 137, 196, 124, 0, 3, 191, 149, 232, 162, 194, 225, 79, 180, 241 ], "signatures": [ "22eafa8b6d1fe3b3383d0c2d364116c535c055d88970c55788fd7c7ab70051059eda10b92278055409a4b1c1546cc96cc3cf5538a0dd80f0d3996d31854f430f", "3e09a2514a1e26281cd0397dda2764948e4b8036e1ad71de693153ea8152ff03003138de8bcbaccb79e0fd2d8155baa335a56f424319a8901b69f775cb7ca603", "e92bde230468bcb0613d2605a2735eebe3f073c90d32229982c16b2a4077260e329b860f28e547fec53702182aed779c1ecff3ea88fbc9133114a741bde7260c", "7a449310a688ca5d80ef8c3629101a13d0971655d4b73716770a45951a225d02fce1913bc57d8da3d79d6289342a59a79d52609b247826eb4a41bd4111fed50c", "8b1d95b564d8de1858755ebceb91c2c25b8ba49aa974a0cede44256030736b0c617187de05e8aaa1a78e2bcf62f2b20d7fe235e75667ec01c58b3b411c396305"] }


Less details
source code | moneroexplorer