Monero Transaction 120b7b9f7a748adaa14fff4620cb7b5fc26a583105d3dcc7ba48e5b35b69587e

Autorefresh is OFF

Tx hash: 120b7b9f7a748adaa14fff4620cb7b5fc26a583105d3dcc7ba48e5b35b69587e

Tx prefix hash: a3042f2eab720e6532f2288477e2f044d8a00f682018efd81f304c8544599b8e
Tx public key: 10d58a4bfe476f476e514e69a866008c4b8505368e9858638a8def38757242f6
Payment id: 145ad565367363d7358ceb620978473f71d4a437a82611a06df06e1afde5dbfa

Transaction 120b7b9f7a748adaa14fff4620cb7b5fc26a583105d3dcc7ba48e5b35b69587e was carried out on the Monero network on 2014-05-12 20:30:41. The transaction has 3268203 confirmations. Total output fee is 0.000001130949 XMR.

Timestamp: 1399926641 Timestamp [UTC]: 2014-05-12 20:30:41 Age [y:d:h:m:s]: 10:221:18:46:15
Block: 36794 Fee (per_kB): 0.000001130949 (0.000001295405) Tx size: 0.8730 kB
Tx version: 1 No of confirmations: 3268203 RingCT/type: no
Extra: 022100145ad565367363d7358ceb620978473f71d4a437a82611a06df06e1afde5dbfa0110d58a4bfe476f476e514e69a866008c4b8505368e9858638a8def38757242f6

5 output(s) for total of 14.000772000000 xmr

stealth address amount amount idx tag
00: 96d5cbd5b6d0ec99ac7a47f5603c55a93030a79d09de6510df97af72ea169871 0.000002000000 3937 of 41703 -
01: 6b78320d06ad76a744f1b089b629ed7f798e457532a5f7638512cab82bbf4a58 0.000070000000 3896 of 59071 -
02: 79449e88d5cb9546974f8f0664048299ee0f38292082ffb297edf58368ad46f4 0.000700000000 3878 of 77523 -
03: e04902eea67136ad6df1826bd9e81e042c426ad8561a9b80a1624fa3873a8449 4.000000000000 354 of 237197 -
04: beb56e72ca6ccee64e944c1ea79b05e0d176a217e379cfc807f099838bab6927 10.000000000000 36624 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-12 00:07:16 till 2014-05-12 10:13:03; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |___________________________________________________________________________________________*______________________________________________________________________________|
  • |_________________*________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________*________________|
  • |_________________________________________________________________________________________________________________________________________________________*________________|

6 inputs(s) for total of 14.000773130949 xmr

key image 00: fb023f6c7372ea1cec6e5ad35c65d7a0668e945cde4c3cc6bec420b84c61ed45 amount: 0.000000130949
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7f5a965022297677de15d0440822c58395ddc70bf623dfffd74b09271637df44 00035904 0 0/7 2014-05-12 05:08:55 10:222:10:08:01
key image 01: 24d1e9362aba8b1a3b7b3dcaab0bb2c907b2d231fd09917a7163451448fa2029 amount: 0.000070000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a42d7734308f9a89aa85fec92e227d9531d53e722bbdf98349d8c54def1613a8 00035904 0 0/7 2014-05-12 05:08:55 10:222:10:08:01
key image 02: 92e2f5be27413d863db8149365e834593c2009afe0ecb15538ac434cb5da5eaa amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 14d1fc6bea93eb6c245578312637af75fcb65fa2c514e840b71ac3f0868bd264 00035938 0 0/6 2014-05-12 05:33:11 10:222:09:43:45
key image 03: 56bfcddf7c1c9d016998b83f301c3919741260fa1ab55506db2dffd48fdaf392 amount: 0.000700000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0ecceea92f30580d4bc1af227deea0d2edc8af29d98010a3acf3ee695d25cdc2 00035635 0 0/8 2014-05-12 01:07:16 10:222:14:09:40
key image 04: 73cfa2e2f582382ea8e1ebb61071a4074fd66dac2465fa714c2aab9be35e081e amount: 0.000003000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f90051df4f8dabf2e15da3fe8bfd722d850f6b1d361a7edd7497047c27c7271a 00036161 0 0/6 2014-05-12 09:13:03 10:222:06:03:53
key image 05: eda896a3be2818cb536df4a3899fc2b97037a953d863b9aa5012a291e50027ab amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d2eb3b675084d11906db0e2d170cd8448b09a647007e63f710ea65f6f81396e3 00036161 0 0/6 2014-05-12 09:13:03 10:222:06:03:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 130949, "key_offsets": [ 0 ], "k_image": "fb023f6c7372ea1cec6e5ad35c65d7a0668e945cde4c3cc6bec420b84c61ed45" } }, { "key": { "amount": 70000000, "key_offsets": [ 3795 ], "k_image": "24d1e9362aba8b1a3b7b3dcaab0bb2c907b2d231fd09917a7163451448fa2029" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 35273 ], "k_image": "92e2f5be27413d863db8149365e834593c2009afe0ecb15538ac434cb5da5eaa" } }, { "key": { "amount": 700000000, "key_offsets": [ 3732 ], "k_image": "56bfcddf7c1c9d016998b83f301c3919741260fa1ab55506db2dffd48fdaf392" } }, { "key": { "amount": 3000000, "key_offsets": [ 3726 ], "k_image": "73cfa2e2f582382ea8e1ebb61071a4074fd66dac2465fa714c2aab9be35e081e" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 35465 ], "k_image": "eda896a3be2818cb536df4a3899fc2b97037a953d863b9aa5012a291e50027ab" } } ], "vout": [ { "amount": 2000000, "target": { "key": "96d5cbd5b6d0ec99ac7a47f5603c55a93030a79d09de6510df97af72ea169871" } }, { "amount": 70000000, "target": { "key": "6b78320d06ad76a744f1b089b629ed7f798e457532a5f7638512cab82bbf4a58" } }, { "amount": 700000000, "target": { "key": "79449e88d5cb9546974f8f0664048299ee0f38292082ffb297edf58368ad46f4" } }, { "amount": 4000000000000, "target": { "key": "e04902eea67136ad6df1826bd9e81e042c426ad8561a9b80a1624fa3873a8449" } }, { "amount": 10000000000000, "target": { "key": "beb56e72ca6ccee64e944c1ea79b05e0d176a217e379cfc807f099838bab6927" } } ], "extra": [ 2, 33, 0, 20, 90, 213, 101, 54, 115, 99, 215, 53, 140, 235, 98, 9, 120, 71, 63, 113, 212, 164, 55, 168, 38, 17, 160, 109, 240, 110, 26, 253, 229, 219, 250, 1, 16, 213, 138, 75, 254, 71, 111, 71, 110, 81, 78, 105, 168, 102, 0, 140, 75, 133, 5, 54, 142, 152, 88, 99, 138, 141, 239, 56, 117, 114, 66, 246 ], "signatures": [ "4cd34e4c877c74597b2c4a595c662114791a73390de681adb92d8b6edbf6760f18f6df79bf8b2f4786259e01bbfebc7cb2297f0ca029e92300ad6f3c47619403", "353a49a57331b7139a5adc5ede325053e68dc0749ffce93bb3034d312a92950810e34a9ed81eadc28e0dbae4dde1194f8790cebe64ac8e29c449ca72ea38a200", "3516054d2519dc015b6b71a88ec4c9eaaa72383199e0b842b54d38f30b7a880eb5b81cfcf328aeb8ebfed92cf271e7dd496ba08ab6227fd3f78fa2a8cf4bb804", "c81759ae7966051e9b2b4e0b208b6ca30b9e430e8af084b7413f4002fb2aca07d2c8427d9009bd6f552b20f6b910a598692f8baa5f234f422423e8e4fafc0a00", "6e6c3b2942c05073f28aaa2e4e618fb4871573e7f9f8149538a1d68d1466a104151e4f66af37cfaa11d527322bfedc32b59646d48208ae0e7e46991148ba3608", "47b9b84391b953610ce11bf880fb2ad4a26d51128a02a67efc4f01e53200db0920beb27689b0cc29e113e3e950aba9b2dca224129039ee27c25a4f66b5c07209"] }


Less details
source code | moneroexplorer