Monero Transaction 0b4cd5b2a474e567be6eedf55cd605696a4baef3c4377f885dc2f95d0a4753ab

Autorefresh is OFF

Tx hash: 0b4cd5b2a474e567be6eedf55cd605696a4baef3c4377f885dc2f95d0a4753ab

Tx prefix hash: b799b685f72afa23044db1775cb94b0a23bf7f645fb1c0a48ca83c0ee1e717b4
Tx public key: 0032d4507e3b40fcba341dcd07c5414a220ad7cec33c3d587de22c263b235405
Payment id: a7d0a71be548d12872275c54442366e7acfc5f5a5ee37f824e5e2249e0fd46b7

Transaction 0b4cd5b2a474e567be6eedf55cd605696a4baef3c4377f885dc2f95d0a4753ab was carried out on the Monero network on 2014-06-28 10:59:26. The transaction has 3196096 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1403953166 Timestamp [UTC]: 2014-06-28 10:59:26 Age [y:d:h:m:s]: 10:170:00:25:04
Block: 105185 Fee (per_kB): 0.005000000000 (0.014261838440) Tx size: 0.3506 kB
Tx version: 1 No of confirmations: 3196096 RingCT/type: no
Extra: 022100a7d0a71be548d12872275c54442366e7acfc5f5a5ee37f824e5e2249e0fd46b7010032d4507e3b40fcba341dcd07c5414a220ad7cec33c3d587de22c263b235405

2 output(s) for total of 0.007000000000 xmr

stealth address amount amount idx tag
00: acf7461c8cbd2547c0dccd418630236c9595218d1c9ef245192295820797bd71 0.001000000000 43650 of 100400 -
01: 5f3fb69d1997bd3eb8277dc910a4b19ff09713fc6d71a08680c6191af3ec8014 0.006000000000 166382 of 256624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-18 13:04:29 till 2014-05-20 01:39:29; resolution: 0.01 days)

  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_____*____________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.012000000000 xmr

key image 00: 06a3a3d731c39a82d329c7e8105ccb13f92e79d062e68e255e09aaef156433e8 amount: 0.004000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8b1427489a0b6548bd385207661d6b1f37151bb61b51a55913e16c2b9349c219 00047669 1 3/1033 2014-05-20 00:39:29 10:209:10:45:01
key image 01: f2c37b647e35e71e71e00d020ec82b9db68e288c50094f622221887659819b02 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a0fb1ec36d01547231fda0779387155801717331976b24214aae96aed1ae9cad 00045475 1 26/615 2014-05-18 14:04:29 10:210:21:20:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000, "key_offsets": [ 5270 ], "k_image": "06a3a3d731c39a82d329c7e8105ccb13f92e79d062e68e255e09aaef156433e8" } }, { "key": { "amount": 8000000000, "key_offsets": [ 4777 ], "k_image": "f2c37b647e35e71e71e00d020ec82b9db68e288c50094f622221887659819b02" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "acf7461c8cbd2547c0dccd418630236c9595218d1c9ef245192295820797bd71" } }, { "amount": 6000000000, "target": { "key": "5f3fb69d1997bd3eb8277dc910a4b19ff09713fc6d71a08680c6191af3ec8014" } } ], "extra": [ 2, 33, 0, 167, 208, 167, 27, 229, 72, 209, 40, 114, 39, 92, 84, 68, 35, 102, 231, 172, 252, 95, 90, 94, 227, 127, 130, 78, 94, 34, 73, 224, 253, 70, 183, 1, 0, 50, 212, 80, 126, 59, 64, 252, 186, 52, 29, 205, 7, 197, 65, 74, 34, 10, 215, 206, 195, 60, 61, 88, 125, 226, 44, 38, 59, 35, 84, 5 ], "signatures": [ "434fc70708cc286074b23bdf1b8039b99d23c79b3741ed3f9daa31b0f8875f0705c51c159ff0484631baf90ae24d17c9e4145f280034279152fdcaf446476b00", "04ed8a6fbcc7af6d35533f4214804f126b0221ef4cc06063ea1142e032f403055e9dc5bcb014bfbe46ed3ec5ac4829de465c3f109b478b9baabb472f7c53f104"] }


Less details
source code | moneroexplorer