Monero Transaction 168a924695e2b89c19dd0607ac8202ef682dfbcd9a1120e9bf193cea021966ad

Autorefresh is OFF

Tx hash: 168a924695e2b89c19dd0607ac8202ef682dfbcd9a1120e9bf193cea021966ad

Tx prefix hash: 4a16febe79e2aa793c19552595ba02f87e9f9c155ea79976da5fb2105303ceaa
Tx public key: db2b21bfdf1f70663d728d2ac746d408fa8f8a843e2cf2d3217a369d7b104878
Payment id: 74d0e01d34ea488a9efa0c46e72ca69ce356bba8b2b5474ea876b5f6951afb70

Transaction 168a924695e2b89c19dd0607ac8202ef682dfbcd9a1120e9bf193cea021966ad was carried out on the Monero network on 2014-08-27 00:34:40. The transaction has 3120063 confirmations. Total output fee is 0.196487684012 XMR.

Timestamp: 1409099680 Timestamp [UTC]: 2014-08-27 00:34:40 Age [y:d:h:m:s]: 10:123:23:17:33
Block: 190957 Fee (per_kB): 0.196487684012 (0.251190247726) Tx size: 0.7822 kB
Tx version: 1 No of confirmations: 3120063 RingCT/type: no
Extra: 02210074d0e01d34ea488a9efa0c46e72ca69ce356bba8b2b5474ea876b5f6951afb7001db2b21bfdf1f70663d728d2ac746d408fa8f8a843e2cf2d3217a369d7b104878

5 output(s) for total of 16.403910490000 xmr

stealth address amount amount idx tag
00: 353eff5d31ab186588fe4a6ee87723472b030648327f25056f7a0029e53bbb65 0.003910490000 0 of 1 -
01: 9959ef8a7e3c06f1b143c1ed9a49370830aea5039a65f59b3401056fd66fa721 0.200000000000 412659 of 1272211 -
02: 0cb4aa3845e4b80b399fcd8aa0939e90a5a3b336ad4a7053d1de511620ef8114 0.200000000000 412660 of 1272211 -
03: 2a7542f1619c7d115e74349ab68e5ff62b0bbe3896442ab42dd2fac084ac51cf 6.000000000000 78207 of 207703 -
04: 260b64b1ba6295fcb9366b0ebccd74ee3eb924dc289df4e085a735f70742e488 10.000000000000 220598 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-15 14:22:25 till 2014-08-27 01:22:53; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 16.600398174012 xmr

key image 00: 9b036a06b7dffa4591b33790bb8d4e1df74fea828c08d4e83fd95aac0f8a4bde amount: 0.000398174012
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4cbb77d44dd6e77614ea6d20056abc5441c8b23d842966f1d8738b2e0206a7f5 00174606 0 0/6 2014-08-15 15:22:25 10:135:08:29:48
key image 01: c7b6d9017c0079ee36d6dd9f41d8e5707aae531ba1a7a90e1c01fcf83e82b5f9 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1d81a3a177b2a5d66e49f45b5e4d4b2b6739eab907f52b4a729045c432da6738 00190794 0 0/4 2014-08-26 21:32:02 10:124:02:20:11
key image 02: 59a6610f4540ce97a32e2937b3130aa1d3c7787e5290c23f800dfc300d9bbed6 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b84c8e5a24eb4f659daddff9028f39f7aa279fdb71881db2f8b020436d2f5f1e 00190042 0 0/4 2014-08-26 08:49:24 10:124:15:02:49
key image 03: da8b802fcdafe0cd2356dd56db73a6ca8d8f22c6a89a1637849f1d71522d18c8 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c81d52569c2e5833336b705f27e5b5a697299c777107993713850ad46d3ce714 00190341 0 0/4 2014-08-26 13:44:11 10:124:10:08:02
key image 04: ad229a2a60ebb5c6e751adf6426c0e15086087889f5bb3d53f39aac9d30e6d37 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dbe405fa970f833a38d547ff3fa1081a988f42cf8b609799d4004e088f4ebd43 00190944 1 9/89 2014-08-27 00:22:53 10:123:23:29:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 398174012, "key_offsets": [ 0 ], "k_image": "9b036a06b7dffa4591b33790bb8d4e1df74fea828c08d4e83fd95aac0f8a4bde" } }, { "key": { "amount": 600000000000, "key_offsets": [ 169430 ], "k_image": "c7b6d9017c0079ee36d6dd9f41d8e5707aae531ba1a7a90e1c01fcf83e82b5f9" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 60128 ], "k_image": "59a6610f4540ce97a32e2937b3130aa1d3c7787e5290c23f800dfc300d9bbed6" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 60485 ], "k_image": "da8b802fcdafe0cd2356dd56db73a6ca8d8f22c6a89a1637849f1d71522d18c8" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 16183 ], "k_image": "ad229a2a60ebb5c6e751adf6426c0e15086087889f5bb3d53f39aac9d30e6d37" } } ], "vout": [ { "amount": 3910490000, "target": { "key": "353eff5d31ab186588fe4a6ee87723472b030648327f25056f7a0029e53bbb65" } }, { "amount": 200000000000, "target": { "key": "9959ef8a7e3c06f1b143c1ed9a49370830aea5039a65f59b3401056fd66fa721" } }, { "amount": 200000000000, "target": { "key": "0cb4aa3845e4b80b399fcd8aa0939e90a5a3b336ad4a7053d1de511620ef8114" } }, { "amount": 6000000000000, "target": { "key": "2a7542f1619c7d115e74349ab68e5ff62b0bbe3896442ab42dd2fac084ac51cf" } }, { "amount": 10000000000000, "target": { "key": "260b64b1ba6295fcb9366b0ebccd74ee3eb924dc289df4e085a735f70742e488" } } ], "extra": [ 2, 33, 0, 116, 208, 224, 29, 52, 234, 72, 138, 158, 250, 12, 70, 231, 44, 166, 156, 227, 86, 187, 168, 178, 181, 71, 78, 168, 118, 181, 246, 149, 26, 251, 112, 1, 219, 43, 33, 191, 223, 31, 112, 102, 61, 114, 141, 42, 199, 70, 212, 8, 250, 143, 138, 132, 62, 44, 242, 211, 33, 122, 54, 157, 123, 16, 72, 120 ], "signatures": [ "6ba721e1bf0d8a3bac829492908a769dd50adf5d0bcd7978732d63a18c96be0ea202bb25f958be9ddfb799e4e89cbcb332bd019c64cced1c08b1cf3196fb5704", "dd603667203483464272c4502f205b0085aadbc7b17ad30add84842e5266cf0d2189d205054321dc971953ad1e6a298eb016984b730e7bfe7f42a37808a9e10d", "e52b9d61644f971f937d3c3a4d4fa6920e94a8b4a2a2a4c980b62dce11096901f349cc0b29ea475bb5652c150030ac2010d1ad8d1ba48acb0c99f5ad1538b801", "0f0cbc1d29068ca030b569e2b0b4881f221cd2d119912ac47923f84106ab6f0e24a0a4e252e7f7b9e4cd8b0b59b6e31045d23506a7d222557bddb5c1bef96104", "57c6bef31a7e063f04dc2b2bd9245d101c2ebd877e6a29711909e7045801170ae5d1c21d01ec3332a921ac9e93cef4d68168260003e0c67043948f1409033903"] }


Less details
source code | moneroexplorer