Monero Transaction 06d16bc0dede1a8bdb498fa19209cc19b970ff18f33ef03c56bb472ec63bdbe7

Autorefresh is OFF

Tx hash: 06d16bc0dede1a8bdb498fa19209cc19b970ff18f33ef03c56bb472ec63bdbe7

Tx prefix hash: 50fe6d438670ba6de02a0a7fee94c03e2f3771c023d90a6ac27338ebac75ae53
Tx public key: 49764d8f5b008ca72b2da7aa4f7226a610188698ce95294ecdd24dc136cb1e27

Transaction 06d16bc0dede1a8bdb498fa19209cc19b970ff18f33ef03c56bb472ec63bdbe7 was carried out on the Monero network on 2014-07-16 12:12:42. The transaction has 3161833 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405512762 Timestamp [UTC]: 2014-07-16 12:12:42 Age [y:d:h:m:s]: 10:140:08:11:20
Block: 131161 Fee (per_kB): 0.005000000000 (0.005311203320) Tx size: 0.9414 kB
Tx version: 1 No of confirmations: 3161833 RingCT/type: no
Extra: 0149764d8f5b008ca72b2da7aa4f7226a610188698ce95294ecdd24dc136cb1e27

10 output(s) for total of 20.520000000000 xmr

stealth address amount amount idx tag
00: 87f75ecadf7480b21511ce807777343d1eb0b6ce1a8bfe4fc93285d6de0b2f6e 0.020000000000 199358 of 381492 -
01: fc0ccaa5a8e35dc0f3e3741c7cee9fdb44da4780e2eb0ee85463bf25ea8d18c2 0.100000000000 282343 of 982315 -
02: 96cec08bb83d98a6aefc06ca47207f43c317c747483f1a7906b7a3b6a7e7c238 0.200000000000 205515 of 1272210 -
03: 66dd36995f51d0461c6ed00cf084397ca8521c42fd7b576e359043255f245f36 0.600000000000 88830 of 650760 -
04: 065c2717f8fa8129b8ae0322edd16a84aaf0ae5db9dfd2b6d38a89da49035456 0.800000000000 68032 of 489955 -
05: c0f12fe53b4c55a873a84785f5d3d7aac91d5c6b7b6c60d39698a61d8acefa2d 0.800000000000 68033 of 489955 -
06: 0c68bc12c5deaaf86c8e55e81c5f6e8d5f5fe0c883b13bd053612ee42669f06d 1.000000000000 107348 of 874629 -
07: 160c89decfcef93df64852a6088b6b1253eefb9ec4db442a64cd0d55f6d8a1e5 2.000000000000 43584 of 434057 -
08: e331e07cd79722128e7d833d8fa546f67c13407cd2cb40dc3cddff21a5629bfd 5.000000000000 55339 of 255089 -
09: bddd2ea661f23d06f26b420e5f2a63014caff667d0bd18d004b55f0965c1e141 10.000000000000 148015 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-03 23:37:26 till 2014-07-16 12:54:47; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

5 inputs(s) for total of 20.525000000000 xmr

key image 00: 9a50c8e31c330f4249f380bc30139325f7b3d4ac8b9560b1bab254aa2f3789ad amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ed36a718e405e8ecf73c277b811f7d32a465d3a8a3ab650979026bcc7c64ea47 00113250 0 0/6 2014-07-04 00:37:26 10:152:19:46:36
key image 01: 4862b7f9ccd4d2599d7f8582833a107cf09f8bba59c5b256793db03356df9aeb amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: daac96cfa96edc8cc79875a6d17e26302974351e80cfdeab5031da7edd1fd91c 00130804 0 0/5 2014-07-16 06:30:27 10:140:13:53:35
key image 02: 15def9b486cf3257dfe74631e9a1b18946c49ecc78e5e8daeab6e5d29d143067 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7210c946af9c5a6f6dc48b5d36c60e97df831003db2604ca168a6c2c3381412a 00131065 0 0/6 2014-07-16 10:43:21 10:140:09:40:41
key image 03: 13dfb13ae65b2c7dfab0c9b54dba9bd9b2d8ebcf9ba57bf8bf942f4a2abe64c8 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: df052a532d611bc31f525504221812c053dff17d029de44949902abb539424b0 00131136 1 5/11 2014-07-16 11:54:47 10:140:08:29:15
key image 04: c40a1af9d06924be713848cd99da5277ff8c1bde02e0c791414c34a3c319b5b6 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 567de990dc687a407eebdee6de11b10ff0e94f6f8415b24b24608c3abb53e79f 00131086 0 0/6 2014-07-16 11:00:10 10:140:09:23:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 182404 ], "k_image": "9a50c8e31c330f4249f380bc30139325f7b3d4ac8b9560b1bab254aa2f3789ad" } }, { "key": { "amount": 500000000000, "key_offsets": [ 128130 ], "k_image": "4862b7f9ccd4d2599d7f8582833a107cf09f8bba59c5b256793db03356df9aeb" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 147876 ], "k_image": "15def9b486cf3257dfe74631e9a1b18946c49ecc78e5e8daeab6e5d29d143067" } }, { "key": { "amount": 20000000000, "key_offsets": [ 199355 ], "k_image": "13dfb13ae65b2c7dfab0c9b54dba9bd9b2d8ebcf9ba57bf8bf942f4a2abe64c8" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 147906 ], "k_image": "c40a1af9d06924be713848cd99da5277ff8c1bde02e0c791414c34a3c319b5b6" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "87f75ecadf7480b21511ce807777343d1eb0b6ce1a8bfe4fc93285d6de0b2f6e" } }, { "amount": 100000000000, "target": { "key": "fc0ccaa5a8e35dc0f3e3741c7cee9fdb44da4780e2eb0ee85463bf25ea8d18c2" } }, { "amount": 200000000000, "target": { "key": "96cec08bb83d98a6aefc06ca47207f43c317c747483f1a7906b7a3b6a7e7c238" } }, { "amount": 600000000000, "target": { "key": "66dd36995f51d0461c6ed00cf084397ca8521c42fd7b576e359043255f245f36" } }, { "amount": 800000000000, "target": { "key": "065c2717f8fa8129b8ae0322edd16a84aaf0ae5db9dfd2b6d38a89da49035456" } }, { "amount": 800000000000, "target": { "key": "c0f12fe53b4c55a873a84785f5d3d7aac91d5c6b7b6c60d39698a61d8acefa2d" } }, { "amount": 1000000000000, "target": { "key": "0c68bc12c5deaaf86c8e55e81c5f6e8d5f5fe0c883b13bd053612ee42669f06d" } }, { "amount": 2000000000000, "target": { "key": "160c89decfcef93df64852a6088b6b1253eefb9ec4db442a64cd0d55f6d8a1e5" } }, { "amount": 5000000000000, "target": { "key": "e331e07cd79722128e7d833d8fa546f67c13407cd2cb40dc3cddff21a5629bfd" } }, { "amount": 10000000000000, "target": { "key": "bddd2ea661f23d06f26b420e5f2a63014caff667d0bd18d004b55f0965c1e141" } } ], "extra": [ 1, 73, 118, 77, 143, 91, 0, 140, 167, 43, 45, 167, 170, 79, 114, 38, 166, 16, 24, 134, 152, 206, 149, 41, 78, 205, 210, 77, 193, 54, 203, 30, 39 ], "signatures": [ "d61b343cb510526740b384cd0c36924b2d07276a696c7658ef6a18654ff91d0841ee708f54ce8c1cf9bbf961a00f2efa34b9e5274e5df5d10e762c9abb101f04", "86ab5bf30f8b0b058e2566354e5629aef8034bea085dbdaa092a7e436e0b0a0b72d9f6ee729b2b8e6c99b1b4e45bc69dcb36890f29b9ba844bc93bc034f2d705", "6f36055eba7a0f827b752c42cb0c617add5584e203aff061b2359a355e0593016d232254daf16286fb7f19a4692140ebce541e517efb87f5517d935431e83e0a", "c4313984b98e235ab65878f84196082bbbfcc7c6b3044b0b80889e9eaeb5420d1bb30b6fe8b641bffa1654b5914d9e4559c2fcb019449b70c00c4f815724610e", "7fbff0c14bde9fcfdf3cac60f4ea8686c81eefef8fe4bfce5489a631c8a4f105bcfe64bbf0de76421377c09a30b1196ff0d7cbe548989c71ed7bcf82e730050b"] }


Less details
source code | moneroexplorer