Monero Transaction 0a06c97dfd225d9b5b63bbb51785134176877d40c2f1204de53ce1efb6313596

Autorefresh is OFF

Tx hash: 0a06c97dfd225d9b5b63bbb51785134176877d40c2f1204de53ce1efb6313596

Tx prefix hash: 0a58dc21589650d5eba041374064f40520e76c14fc9ef5fe8cd869eaf8ef35bc
Tx public key: 2b6c8491314cc938cf055d5faf4c201fdf8da69e51fbfcd5fe6c24cf52b3bc1c
Payment id: a916fd5f6cad97f25274c412ee7ea7e6673f26fed6910c8cd8703f79c6089783

Transaction 0a06c97dfd225d9b5b63bbb51785134176877d40c2f1204de53ce1efb6313596 was carried out on the Monero network on 2014-07-19 09:31:33. The transaction has 3142877 confirmations. Total output fee is 0.005181260908 XMR.

Timestamp: 1405762293 Timestamp [UTC]: 2014-07-19 09:31:33 Age [y:d:h:m:s]: 10:117:01:22:52
Block: 135404 Fee (per_kB): 0.005181260908 (0.006278829787) Tx size: 0.8252 kB
Tx version: 1 No of confirmations: 3142877 RingCT/type: no
Extra: 022100a916fd5f6cad97f25274c412ee7ea7e6673f26fed6910c8cd8703f79c6089783012b6c8491314cc938cf055d5faf4c201fdf8da69e51fbfcd5fe6c24cf52b3bc1c

9 output(s) for total of 3.595462107131 xmr

stealth address amount amount idx tag
00: 41bfe39712beb02d22ba4c79346f5beb2fcdba76299326bc83be90d788db3b92 0.000462107131 0 of 1 -
01: 0bad5be1f8a7d98fff03a329131299273ba90e2b4591cdc544e075699b4d082d 0.006000000000 171735 of 256624 -
02: 9f7476547a02af2f63e3ecda074c9e24d8cce143583f965b6d221a2fc2c864b4 0.009000000000 150436 of 233398 -
03: c6e8e062c79c4b2ff7440df18358b357b1e12d6572cb7e7828adc12619e0ede8 0.010000000000 315071 of 502466 -
04: 20129046484aa291cb50aa8424bac0bfe7bac73ca54482265db6c9c0e36cc42d 0.070000000000 84292 of 263947 -
05: 1ce5500a86d390152b34d573ddca11fd62b378389fc54d78e8f8f341c53285ef 0.200000000000 220840 of 1272210 -
06: 684a537c0e1cb8d73f5bff89bb3532d4501f9e388749523ae25e50edac98ccea 0.300000000000 107422 of 976536 -
07: 29a810e6892f54397bf7555a54892338c7de9f2766b9bf108ef1a8abda86856b 1.000000000000 115256 of 874629 -
08: f5e0787158dea11a7fba293e6cb5e8a01a6728df6363e2eaf1b256d69a4831c8 2.000000000000 46508 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-21 04:20:43 till 2014-07-04 04:38:44; resolution: 0.08 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________*____________________________________________________________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

4 inputs(s) for total of 3.600643368039 xmr

key image 00: f193a25508929f35e24ccde7dc6d448329efea49c06f0ed7941aacb99b64bfad amount: 0.000643368039
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8188d7224210580c11871fdf0f3be59f135e2b82c794c5a52c9a88dcb009690b 00094840 1 10/132 2014-06-21 07:25:29 10:145:03:28:56
key image 01: 6c50e6fd0f7a9e8064e793321b2635e2e6ae04eb32bd7264b60f30c2f2024545 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 33302b148e12958fb2b4320f0c39e99dd94a7f2d4c5608e14ad89ad8ec8b94fc 00098730 1 16/62 2014-06-23 23:01:58 10:142:11:52:27
key image 02: 086d1282e83710df0e743e1d798ab4d9bda54b0aef68486c4ec201fcf243ff35 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e75e3ad8ee034f315f405f76ec1fb00738c30c2763fbf74d2d83dc9d3fb4a371 00094694 1 4/121 2014-06-21 05:20:43 10:145:05:33:42
key image 03: 1504cbd94143e2a4fabfb08e4ef40f7205abb2a5d4ed86137c2d47f4e34e02f2 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e087e0cd06fcba179bb5d5c60b96600c045715239731e59fee0dee8003aae15a 00113434 1 171/92 2014-07-04 03:38:44 10:132:07:15:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 643368039, "key_offsets": [ 0 ], "k_image": "f193a25508929f35e24ccde7dc6d448329efea49c06f0ed7941aacb99b64bfad" } }, { "key": { "amount": 500000000000, "key_offsets": [ 48721 ], "k_image": "6c50e6fd0f7a9e8064e793321b2635e2e6ae04eb32bd7264b60f30c2f2024545" } }, { "key": { "amount": 100000000000, "key_offsets": [ 137152 ], "k_image": "086d1282e83710df0e743e1d798ab4d9bda54b0aef68486c4ec201fcf243ff35" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 20689 ], "k_image": "1504cbd94143e2a4fabfb08e4ef40f7205abb2a5d4ed86137c2d47f4e34e02f2" } } ], "vout": [ { "amount": 462107131, "target": { "key": "41bfe39712beb02d22ba4c79346f5beb2fcdba76299326bc83be90d788db3b92" } }, { "amount": 6000000000, "target": { "key": "0bad5be1f8a7d98fff03a329131299273ba90e2b4591cdc544e075699b4d082d" } }, { "amount": 9000000000, "target": { "key": "9f7476547a02af2f63e3ecda074c9e24d8cce143583f965b6d221a2fc2c864b4" } }, { "amount": 10000000000, "target": { "key": "c6e8e062c79c4b2ff7440df18358b357b1e12d6572cb7e7828adc12619e0ede8" } }, { "amount": 70000000000, "target": { "key": "20129046484aa291cb50aa8424bac0bfe7bac73ca54482265db6c9c0e36cc42d" } }, { "amount": 200000000000, "target": { "key": "1ce5500a86d390152b34d573ddca11fd62b378389fc54d78e8f8f341c53285ef" } }, { "amount": 300000000000, "target": { "key": "684a537c0e1cb8d73f5bff89bb3532d4501f9e388749523ae25e50edac98ccea" } }, { "amount": 1000000000000, "target": { "key": "29a810e6892f54397bf7555a54892338c7de9f2766b9bf108ef1a8abda86856b" } }, { "amount": 2000000000000, "target": { "key": "f5e0787158dea11a7fba293e6cb5e8a01a6728df6363e2eaf1b256d69a4831c8" } } ], "extra": [ 2, 33, 0, 169, 22, 253, 95, 108, 173, 151, 242, 82, 116, 196, 18, 238, 126, 167, 230, 103, 63, 38, 254, 214, 145, 12, 140, 216, 112, 63, 121, 198, 8, 151, 131, 1, 43, 108, 132, 145, 49, 76, 201, 56, 207, 5, 93, 95, 175, 76, 32, 31, 223, 141, 166, 158, 81, 251, 252, 213, 254, 108, 36, 207, 82, 179, 188, 28 ], "signatures": [ "6975e88714629ffe4d94c3d3855e87c6197b590d41b82b57cdc2b33522ae12027812e28aa7f2a13c179e5d4f62fe6fbb65038a1cf072ef2ff5c1283b6c81a005", "0621296cfd66f3ee2706bac20c919fb2dd7be79e98253cc4825fda147dda60049469e505d0bf483f490fa5fd4af10b0ebaa2372ae5a6c2cfce85554b7a165d0d", "f914547d599a0f24f45046267570b3502b61254002c1dcc12d1548daaae5b30f8702897e7867899cc76bc1ff2103f2a2fbf6f0bfd8e816148c50a3b3da503309", "6ec5ef003142cfe4174fe478dfc61051ba6d0422dad81853f569dbead1c6230b748b356fb44b90f9b843b8326722a9866230eb8916c450b1b5c6f53c5c97ed01"] }


Less details
source code | moneroexplorer