Monero Transaction 066fe4017e1c5617f2bf9047ce422e3d7e1dc1e4287d2b0dd22222ee85746d14

Autorefresh is OFF

Tx hash: 066fe4017e1c5617f2bf9047ce422e3d7e1dc1e4287d2b0dd22222ee85746d14

Tx prefix hash: 54e9e0cad70e70212b8d79de82db3444d354199298ec1fe3116209e17d62935e
Tx public key: 32d5eaef46c311c2c1a87c1bdcd1fc28c4e8c8e49f558ceb0581a3de1b336a96
Payment id: e8ab91beb8caf5c25d301c7c308a422bb1aa6f7b75ae620aeb665e878d9f7d91

Transaction 066fe4017e1c5617f2bf9047ce422e3d7e1dc1e4287d2b0dd22222ee85746d14 was carried out on the Monero network on 2016-09-08 02:10:12. The transaction has 2170196 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1473300612 Timestamp [UTC]: 2016-09-08 02:10:12 Age [y:d:h:m:s]: 08:097:10:59:12
Block: 1131150 Fee (per_kB): 0.020000000000 (0.017459505541) Tx size: 1.1455 kB
Tx version: 1 No of confirmations: 2170196 RingCT/type: no
Extra: 022100e8ab91beb8caf5c25d301c7c308a422bb1aa6f7b75ae620aeb665e878d9f7d910132d5eaef46c311c2c1a87c1bdcd1fc28c4e8c8e49f558ceb0581a3de1b336a96

9 output(s) for total of 1499.980000000000 xmr

stealth address amount amount idx tag
00: 05d77ec1e013d78f46d7d1f149e2b923fff9261a3ecb9260c2ff121af1e7b13c 0.080000000000 224221 of 269576 -
01: 02121e479bd5bfcecb4a88052b77feb881f3d29b91d2d31f7b9ae5c8df8c548d 0.900000000000 395157 of 454894 -
02: 586298dee86cf79ca23b0ac72b511d14a64708af1720a5b43c41d4fa0130f7c7 4.000000000000 211017 of 237197 -
03: 09e16a687064298afed62bd00f20e7d9a29228fa4642e39430029a79a4527966 5.000000000000 224375 of 255089 -
04: cc1bba0fe4c3586390c1ad941f8d23998723601fa3e44d244039041e9b62707c 20.000000000000 64508 of 78991 -
05: 8b74ca5c746cebeaee10fbd112d3ed69abfedbe82216fae625850e79734fce10 70.000000000000 18333 of 24819 -
06: ffa5ff17ed0b530a11887134666cd09378796a7294dbe0364ae46a97bf73ed5a 100.000000000000 44360 of 57197 -
07: 43e55c87ebdcdc47f304cd11dae5c923dd84f8ca3622dd8872ce6d47bac6f29c 300.000000000000 11955 of 16700 -
08: 4fcc8c4a013c9bd919fc9d9416e2ccc8bbb0482a41574d6ecb942ed267b68662 1000.000000000000 10297 of 11881 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-13 01:34:43 till 2016-03-21 02:08:07; resolution: 3.63 days)

  • |_**___________________________________________________________*___________________________________________________________________*_____________________*_________________|
  • |_*______________________________________________________________________________*_______________________________________*__________________________________________*_____*|

2 inputs(s) for total of 1500.000000000000 xmr

key image 00: 7958fd815be2fe0f46b1b68552d6c84f8507e0f69e168ffe65ba69ccd6d8d6f8 amount: 500.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7a39ac1f66ff88b5c5ece4d0e289fff75a5e14b0365b1d1e9a275860985ac63f 00126282 1 150/6 2014-07-13 02:39:32 10:155:10:29:52
- 01: 21611475841c804ed38878a13c94876cdacb67edd356b9bc2de05d999286fa6b 00136409 1 19/8 2014-07-20 01:58:57 10:148:11:10:27
- 02: b66d0b070ed47e4f0c321395b8e09238050fb80255a25946a90502077eed47db 00448209 1 172/5 2015-02-23 03:37:44 09:295:09:31:40
- 03: 83f59f17755908d7f14b5cdd223984f732afd006d9a00837bd94d1b5aca6eaa8 00804734 1 116/2 2015-10-30 16:16:36 09:045:20:52:48
- 04: 8a5d0a192c1fa7c18b6294bc3751410cea7900ec4064afd2c0273e148b960b3e 00913175 1 131/3 2016-01-15 09:40:31 08:334:03:28:53
key image 01: e81fa6304ac2d14db1f6ddc53261232a58b7b7b21fce3d7b83796fd98f744588 amount: 1000.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 51bd2526441cc078ca9ec9b53c30a2587696162115abf86c7b07c69a3bd034ea 00126277 1 140/6 2014-07-13 02:34:43 10:155:10:34:41
- 01: ec40e284cb012979f06f1625ca9187191db403d87e75d6ce66fa2c0a12349c51 00543577 1 55/10 2015-04-30 16:04:20 09:228:21:05:04
- 02: 2d3c096724af0401d5997ad4e7a4499c839b7532331bf462d4aade4cab0b1163 00751912 4 8/9 2015-09-23 13:53:35 09:082:23:15:49
- 03: d969a43105aabe8d860fd48948b430da98caf7ce1d24ad9bf04cbf824a048876 00971838 1 56/12 2016-02-25 18:42:51 08:292:18:26:33
- 04: 3cc41a4f0b4a5cbb71d5194f77805e20225c66539879cf62ddb9e7e6e115b485 01006152 1 6/4 2016-03-21 01:08:07 08:268:12:01:17
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000000, "key_offsets": [ 1417, 60, 1942, 3191, 905 ], "k_image": "7958fd815be2fe0f46b1b68552d6c84f8507e0f69e168ffe65ba69ccd6d8d6f8" } }, { "key": { "amount": 1000000000000000, "key_offsets": [ 445, 1981, 1452, 1824, 539 ], "k_image": "e81fa6304ac2d14db1f6ddc53261232a58b7b7b21fce3d7b83796fd98f744588" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "05d77ec1e013d78f46d7d1f149e2b923fff9261a3ecb9260c2ff121af1e7b13c" } }, { "amount": 900000000000, "target": { "key": "02121e479bd5bfcecb4a88052b77feb881f3d29b91d2d31f7b9ae5c8df8c548d" } }, { "amount": 4000000000000, "target": { "key": "586298dee86cf79ca23b0ac72b511d14a64708af1720a5b43c41d4fa0130f7c7" } }, { "amount": 5000000000000, "target": { "key": "09e16a687064298afed62bd00f20e7d9a29228fa4642e39430029a79a4527966" } }, { "amount": 20000000000000, "target": { "key": "cc1bba0fe4c3586390c1ad941f8d23998723601fa3e44d244039041e9b62707c" } }, { "amount": 70000000000000, "target": { "key": "8b74ca5c746cebeaee10fbd112d3ed69abfedbe82216fae625850e79734fce10" } }, { "amount": 100000000000000, "target": { "key": "ffa5ff17ed0b530a11887134666cd09378796a7294dbe0364ae46a97bf73ed5a" } }, { "amount": 300000000000000, "target": { "key": "43e55c87ebdcdc47f304cd11dae5c923dd84f8ca3622dd8872ce6d47bac6f29c" } }, { "amount": 1000000000000000, "target": { "key": "4fcc8c4a013c9bd919fc9d9416e2ccc8bbb0482a41574d6ecb942ed267b68662" } } ], "extra": [ 2, 33, 0, 232, 171, 145, 190, 184, 202, 245, 194, 93, 48, 28, 124, 48, 138, 66, 43, 177, 170, 111, 123, 117, 174, 98, 10, 235, 102, 94, 135, 141, 159, 125, 145, 1, 50, 213, 234, 239, 70, 195, 17, 194, 193, 168, 124, 27, 220, 209, 252, 40, 196, 232, 200, 228, 159, 85, 140, 235, 5, 129, 163, 222, 27, 51, 106, 150 ], "signatures": [ "ed273948c56b6e8d495b587cba0378f554073a00186c0740ed2684f2d844bc05f0bfbf0a9e5ce5b27b46df9832fb66e9366b336a15a4dd232dab552414d4c70bc0fe7bb564ded3fc821af8c3b0bb2eeed6b95183f9afe223cde5ac419cf3f5023ef35b37205670d2bff2f08730948e20eeb05597d1d8ec461bea7478e1290c043e4164cdf9b730fbb4483212484fa1e39f2e2116fce5349c27049a82047d180809f68bd2ec60852e7c1d9534ba751ce44adc7f378c68ca9d96c78ada7cb8770b6257f9d8d1c6e04c25cfb0f6849faf8c4c51baad59509e6595e22dfde0e096076df5f97fafc7fcd4ddb36b4b6cbc324651b1552e22d3ad212ebf7f5d7c31b50b3ca5a8e01fbe7a52aaed26ba9bcf1c51552c92aa816a79effe508013a76d3a0e9b4086fe36279b9c53a8516f6bfe6a223dd1c81cd2ddf34cf433f9f5a7238f05", "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"] }


Less details
source code | moneroexplorer