Monero Transaction 163ff95cbda89549f1f7717b7d52876a9dd609ad84ce166814f1397288d26888

Autorefresh is OFF

Tx hash: 163ff95cbda89549f1f7717b7d52876a9dd609ad84ce166814f1397288d26888

Tx prefix hash: 7ddee82c1d1346beea10c06b6283d25abfc8edd16bcce4fadc2b0f95c8885d9c
Tx public key: c575a706a493210ba4c40384661f73f05e4f82b632f509d7b21121a2c90edeed
Payment id: 14d66d02f88c8c3ce8b0ae2b99bdf2bc4ad87d863bde6c2d7bb15f9dd9314a20

Transaction 163ff95cbda89549f1f7717b7d52876a9dd609ad84ce166814f1397288d26888 was carried out on the Monero network on 2014-10-21 11:37:37. The transaction has 3035797 confirmations. Total output fee is 0.106764730000 XMR.

Timestamp: 1413891457 Timestamp [UTC]: 2014-10-21 11:37:37 Age [y:d:h:m:s]: 10:061:18:20:05
Block: 270347 Fee (per_kB): 0.106764730000 (0.136318059252) Tx size: 0.7832 kB
Tx version: 1 No of confirmations: 3035797 RingCT/type: no
Extra: 02210014d66d02f88c8c3ce8b0ae2b99bdf2bc4ad87d863bde6c2d7bb15f9dd9314a2001c575a706a493210ba4c40384661f73f05e4f82b632f509d7b21121a2c90edeed

5 output(s) for total of 52.100000000000 xmr

stealth address amount amount idx tag
00: fdd0d5b2db929b985cdd1d301bfa7cf18d38e804249451f35347a65a3e4a9432 0.200000000000 574507 of 1272211 -
01: 927fb69b9ee8a120a45e649764b63ceb9de59091627c5c5ba8153812db204330 0.900000000000 148614 of 454894 -
02: 8bd414d39f15fe9eb4530f7180f6e321c5815c37c22894f662949544ff59cd77 1.000000000000 310932 of 874630 -
03: bdeb3267e183ae53aca338181fad251eb5b1d284268261bff36c7b7945edbe5c 10.000000000000 314805 of 921411 -
04: 5bf6467e07c72578c12b1750e3d8e37fbebc67254c86201c0b36d6cce5041d67 40.000000000000 6823 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-25 09:54:08 till 2014-10-10 07:40:30; resolution: 0.45 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________*____________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |______________________*___________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________*____________________________________________________________________________________________|

5 inputs(s) for total of 52.206764730000 xmr

key image 00: d1bad57e3d68fb704112dcca3fefc2ad5eb7dc71f31d34e7b8e9d264d1c907f2 amount: 0.006764730000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 78cfde4e2cbb7b971aca3a2832c2a29fc76921e527a42967d15df73575ac6ec7 00254347 1 4/4 2014-10-10 06:40:30 10:072:23:17:12
key image 01: b63295401e59325941f1b3fd0f1b94183cc4f4a5f8ea4cf40eccd085ee7fe417 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: afe5b42181bd2a75ab17d056d196866332c615be7d82493186b89a1538a93f68 00209612 1 2/2 2014-09-09 01:41:39 10:104:04:16:03
key image 02: ad125773750b7b31076cec6b6e984e258f1180611bc59df7ef462656f0dd5f9b amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e11ba13af7672bab0e82c9fa4014372ef55aab27acd24fb676b969fc90b02ab0 00144148 2 1/9 2014-07-25 10:54:08 10:149:19:03:34
key image 03: 021eebb4c4427d6bb3c7c7d88d3b8bfa66d1efbe528d522928c7245e423145ba amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b2c1eaa1768443f26bc6844b24fea41e78cd2a479b59f692db0612355694159e 00158055 1 44/4 2014-08-04 03:04:50 10:140:02:52:52
key image 04: 40def75f356c1eed6e50b922e5802b7b47e50279097e9f13173bf0ca5de43b94 amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: af8ecff5a01d6d202b7f4d42bd0da6cfb16e0e9ae961e29caf5416355d67d476 00193785 1 8/4 2014-08-29 00:02:26 10:115:05:55:16
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6764730000, "key_offsets": [ 0 ], "k_image": "d1bad57e3d68fb704112dcca3fefc2ad5eb7dc71f31d34e7b8e9d264d1c907f2" } }, { "key": { "amount": 500000000000, "key_offsets": [ 299136 ], "k_image": "b63295401e59325941f1b3fd0f1b94183cc4f4a5f8ea4cf40eccd085ee7fe417" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 133521 ], "k_image": "ad125773750b7b31076cec6b6e984e258f1180611bc59df7ef462656f0dd5f9b" } }, { "key": { "amount": 700000000000, "key_offsets": [ 94868 ], "k_image": "021eebb4c4427d6bb3c7c7d88d3b8bfa66d1efbe528d522928c7245e423145ba" } }, { "key": { "amount": 50000000000000, "key_offsets": [ 4962 ], "k_image": "40def75f356c1eed6e50b922e5802b7b47e50279097e9f13173bf0ca5de43b94" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "fdd0d5b2db929b985cdd1d301bfa7cf18d38e804249451f35347a65a3e4a9432" } }, { "amount": 900000000000, "target": { "key": "927fb69b9ee8a120a45e649764b63ceb9de59091627c5c5ba8153812db204330" } }, { "amount": 1000000000000, "target": { "key": "8bd414d39f15fe9eb4530f7180f6e321c5815c37c22894f662949544ff59cd77" } }, { "amount": 10000000000000, "target": { "key": "bdeb3267e183ae53aca338181fad251eb5b1d284268261bff36c7b7945edbe5c" } }, { "amount": 40000000000000, "target": { "key": "5bf6467e07c72578c12b1750e3d8e37fbebc67254c86201c0b36d6cce5041d67" } } ], "extra": [ 2, 33, 0, 20, 214, 109, 2, 248, 140, 140, 60, 232, 176, 174, 43, 153, 189, 242, 188, 74, 216, 125, 134, 59, 222, 108, 45, 123, 177, 95, 157, 217, 49, 74, 32, 1, 197, 117, 167, 6, 164, 147, 33, 11, 164, 196, 3, 132, 102, 31, 115, 240, 94, 79, 130, 182, 50, 245, 9, 215, 178, 17, 33, 162, 201, 14, 222, 237 ], "signatures": [ "9c4d0985ba3df9431e66022795dc74ec78770fd53a71b13fed7b643abdb53e0a3c9542c92bc15a4cc87c0dfdf26cf62804364814ab2c6813cba333c6b337390b", "752c6a78e1e119e51905c2f2b01835e4d2765da884f0a204782c009683898302a4595944de6ace70c45d9747022172072f84fae7b965240bbc7aec8e564f1206", "eb375f6afeec83e6d72743e5f2350a136c86b183846abb4be0bc9b4458487f0d3015bbd034bd118b44ea7314fcbd3ef98c8eb162fb516d2f523eb5a9579ab107", "456fbed9a86c41d79525d0081cb42f4684d8a48ca81128a7c134428617b4330f964558781545416022b192e4dae6978d4ab57b9758a90e6d49153c56a312d40b", "19c20adda4428426a6d413656fe381db4e5ebd8b04980e98e47d469f0766fb0604a10f14fa614c90238c3f38740c599777f6bd56bb245e6e5d94a5cff88b2c05"] }


Less details
source code | moneroexplorer