Monero Transaction 1416bdde906691b3ab823fa4a84dc55002ae1212f67e8b5c61f1edf1542106ad

Autorefresh is OFF

Tx hash: 1416bdde906691b3ab823fa4a84dc55002ae1212f67e8b5c61f1edf1542106ad

Tx prefix hash: 09fd15fca6296ad50723b12ac93c73e7468b9125cc8d63858ab202f43a4deeef
Tx public key: 2b6e9456c130961571157570b1faf04680ee9deb938b18d4c763d4c095e1225c
Payment id: 9584c4cdcc884f7c9cf6b1227ff5545e8a01cb615bff41dca8a2ef8bf5a0a863

Transaction 1416bdde906691b3ab823fa4a84dc55002ae1212f67e8b5c61f1edf1542106ad was carried out on the Monero network on 2014-06-29 07:04:31. The transaction has 3135121 confirmations. Total output fee is 0.005395964930 XMR.

Timestamp: 1404025471 Timestamp [UTC]: 2014-06-29 07:04:31 Age [y:d:h:m:s]: 10:086:02:30:26
Block: 106422 Fee (per_kB): 0.005395964930 (0.008461666291) Tx size: 0.6377 kB
Tx version: 1 No of confirmations: 3135121 RingCT/type: no
Extra: 0221009584c4cdcc884f7c9cf6b1227ff5545e8a01cb615bff41dca8a2ef8bf5a0a863012b6e9456c130961571157570b1faf04680ee9deb938b18d4c763d4c095e1225c

4 output(s) for total of 1.195000000000 xmr

stealth address amount amount idx tag
00: f9160339adf1006c10edcb833974b9cb220da860e73e5645d2a75bf9002a13f7 0.005000000000 179614 of 308584 -
01: fed5c5662aac67473f253550274a315d016a4ae7becf07c1fe39327fa48ce198 0.090000000000 70109 of 317822 -
02: 99a133f4a0c31b2166edaf190ba22e4e00b607df07c8e5943af47f05468d0c58 0.100000000000 203414 of 982315 -
03: 748e694960931254ba357ef5a7e0fbea8aa209b80208a6a365ebbc1ab48ed704 1.000000000000 56200 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 10:17:56 till 2014-06-28 19:16:05; resolution: 0.04 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________________*_____________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________*________|

4 inputs(s) for total of 1.200395964930 xmr

key image 00: 167fa8b3f01cadc8a35751daa313cbffb199a8a6a86ee25ba2d910196d596b73 amount: 0.000395964930
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f28bf480832d546bf5d2ceb2b105064d9fc09f508a023bc163bd9d29d2e9fd6e 00096577 1 3/108 2014-06-22 11:17:56 10:092:22:17:01
key image 01: 07f091e10639f9ac3720474fe35f034ce220e674b66d389a836a4a8b0d98cace amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: eb74b3a713f553ec00d2935a89496e38c4d32480da9e84e4b12deec23ce0787c 00104922 1 7/53 2014-06-28 06:39:16 10:087:02:55:41
key image 02: f6bccd79e7bcd742b45b37d764c3e82205a507aa9f772e2c49ea4ed4605ec7fd amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50731e7e81c4957356ff16d31c54594ce3ae1b45cc578c3e9e566f3626dfb935 00105637 1 9/35 2014-06-28 18:16:05 10:086:15:18:52
key image 03: 7871bad4a6787f39214a5bf1c233f2f9e7007c41a61e7557b6ed6fcf19778783 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ce8906f14912c1f125829493a8a88b59d4e16fd233ce1acd0916c9dce99730fa 00105238 1 15/58 2014-06-28 11:48:57 10:086:21:46:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 395964930, "key_offsets": [ 0 ], "k_image": "167fa8b3f01cadc8a35751daa313cbffb199a8a6a86ee25ba2d910196d596b73" } }, { "key": { "amount": 200000000000, "key_offsets": [ 102815 ], "k_image": "07f091e10639f9ac3720474fe35f034ce220e674b66d389a836a4a8b0d98cace" } }, { "key": { "amount": 500000000000, "key_offsets": [ 68892 ], "k_image": "f6bccd79e7bcd742b45b37d764c3e82205a507aa9f772e2c49ea4ed4605ec7fd" } }, { "key": { "amount": 500000000000, "key_offsets": [ 67634 ], "k_image": "7871bad4a6787f39214a5bf1c233f2f9e7007c41a61e7557b6ed6fcf19778783" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "f9160339adf1006c10edcb833974b9cb220da860e73e5645d2a75bf9002a13f7" } }, { "amount": 90000000000, "target": { "key": "fed5c5662aac67473f253550274a315d016a4ae7becf07c1fe39327fa48ce198" } }, { "amount": 100000000000, "target": { "key": "99a133f4a0c31b2166edaf190ba22e4e00b607df07c8e5943af47f05468d0c58" } }, { "amount": 1000000000000, "target": { "key": "748e694960931254ba357ef5a7e0fbea8aa209b80208a6a365ebbc1ab48ed704" } } ], "extra": [ 2, 33, 0, 149, 132, 196, 205, 204, 136, 79, 124, 156, 246, 177, 34, 127, 245, 84, 94, 138, 1, 203, 97, 91, 255, 65, 220, 168, 162, 239, 139, 245, 160, 168, 99, 1, 43, 110, 148, 86, 193, 48, 150, 21, 113, 21, 117, 112, 177, 250, 240, 70, 128, 238, 157, 235, 147, 139, 24, 212, 199, 99, 212, 192, 149, 225, 34, 92 ], "signatures": [ "b923049ee264bddb807092f22844e1de76aa936bd449981509c7a80225fe0a0a6153bfc5da38f471fb3af6dbfdecbfdc0cbf954d1cdf24bc278d93c2bf8fa50d", "4032a225ce265cea9838a6c93902b826997f0f28c4b6c29c4e42769ae1f77b07623232bceb1d99464a7143ed396e5edeadb5be2102920ead0972fc0c6c5d9308", "b20fa6bb12c7dc43d5f314d04992bf761c8f49335671d6f7419d5a07d785330ff82745e2fd0a2fb15a1c63c331a6e21dc3c433b923781d536e21fc26095afc0a", "ab1462b03ca6ae793fa8a77b326d212315068fe0ab3d9a1e36d67b7d0a6b4201453f031fbcfeee07400545dee0e7fa0b234b79844b5098c9078ffc6977ec210a"] }


Less details
source code | moneroexplorer