Monero Transaction 16b25d1ded154dd5ceb0274df2e03711d4ed2390f2966eac533016342613811d

Autorefresh is OFF

Tx hash: 16b25d1ded154dd5ceb0274df2e03711d4ed2390f2966eac533016342613811d

Tx prefix hash: f9b6743dc9289cc8014976fbd121d55ce201141eda5f8cdf65f158505e7a05ff
Tx public key: 03b110c76464b07628ff9f7852dad6e468706f27f923891aa2c2cec5766c3644
Payment id: b5a9b91eba2bbb90b64adc2f8c0229752da91199f0f7219f1769a5d2360b3984

Transaction 16b25d1ded154dd5ceb0274df2e03711d4ed2390f2966eac533016342613811d was carried out on the Monero network on 2015-01-05 19:00:36. The transaction has 2923376 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1420484436 Timestamp [UTC]: 2015-01-05 19:00:36 Age [y:d:h:m:s]: 09:345:11:09:37
Block: 379168 Fee (per_kB): 0.010000000000 (0.017808695652) Tx size: 0.5615 kB
Tx version: 1 No of confirmations: 2923376 RingCT/type: no
Extra: 022100b5a9b91eba2bbb90b64adc2f8c0229752da91199f0f7219f1769a5d2360b39840103b110c76464b07628ff9f7852dad6e468706f27f923891aa2c2cec5766c3644

5 output(s) for total of 9.990000000000 xmr

stealth address amount amount idx tag
00: 3460cfd441735512cb31159f76fcc8b2fa7441580897c5d63227af91632cb879 9.000000000000 30816 of 274259 -
01: 6e861f75c1d26cbaf643b639da3d16ac94b2c2ebada85ca7151e05f7f1717904 0.900000000000 186982 of 454894 -
02: 9f5ea42b3093abf81f80a7ab92f3e98d5043a4ae897b2a4a42b455c113e0687d 0.080000000000 108844 of 269576 -
03: 36b1f05192f4a573f1c26011de53beb4aeaa5a011c8c59e00c9c89ae069c4f61 0.005000000000 229761 of 308585 -
04: 58fb96b9baab808060c54e5bb833e7631be8f5f9559b91aab2edfd8411427268 0.005000000000 229762 of 308585 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-05 11:08:03 till 2014-12-24 17:52:20; resolution: 1.19 days)

  • |_*___*_________________________________*_________________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 10.000000000000 xmr

key image 00: 3fdb2d195f1f9108db7804aa549e017082dd6f10e9ede1adbb1b52af1bb1654b amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e65a9caf8baf36db7831e85e791a28329a4eee12d01b7ceb51b03874a9ed9eeb 00071832 1 28/54 2014-06-05 12:08:03 10:194:18:02:10
- 01: 96da4b3eacedd9a82f7c0b7edbd37b0814d290263210b261fda76e295ca12469 00078715 0 0/6 2014-06-10 06:20:16 10:189:23:49:57
- 02: 7227fbb5969baf74594fd548d039ffa0e0986a24fc46225091c291d283f675de 00138723 0 0/6 2014-07-21 16:29:43 10:148:13:40:30
- 03: ea96bc333421eba8e4db77774f13c1262ef2a7aa111146bbcf0da6f8a025fc16 00361954 4 4/7 2014-12-24 16:52:20 09:357:13:17:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000000, "key_offsets": [ 73309, 7830, 76662, 261646 ], "k_image": "3fdb2d195f1f9108db7804aa549e017082dd6f10e9ede1adbb1b52af1bb1654b" } } ], "vout": [ { "amount": 9000000000000, "target": { "key": "3460cfd441735512cb31159f76fcc8b2fa7441580897c5d63227af91632cb879" } }, { "amount": 900000000000, "target": { "key": "6e861f75c1d26cbaf643b639da3d16ac94b2c2ebada85ca7151e05f7f1717904" } }, { "amount": 80000000000, "target": { "key": "9f5ea42b3093abf81f80a7ab92f3e98d5043a4ae897b2a4a42b455c113e0687d" } }, { "amount": 5000000000, "target": { "key": "36b1f05192f4a573f1c26011de53beb4aeaa5a011c8c59e00c9c89ae069c4f61" } }, { "amount": 5000000000, "target": { "key": "58fb96b9baab808060c54e5bb833e7631be8f5f9559b91aab2edfd8411427268" } } ], "extra": [ 2, 33, 0, 181, 169, 185, 30, 186, 43, 187, 144, 182, 74, 220, 47, 140, 2, 41, 117, 45, 169, 17, 153, 240, 247, 33, 159, 23, 105, 165, 210, 54, 11, 57, 132, 1, 3, 177, 16, 199, 100, 100, 176, 118, 40, 255, 159, 120, 82, 218, 214, 228, 104, 112, 111, 39, 249, 35, 137, 26, 162, 194, 206, 197, 118, 108, 54, 68 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer