Monero Transaction 16ba5294664512597fd810814b3cba56aa3d5e0b3fc3d163fed2b98078d02b9f

Autorefresh is OFF

Tx hash: 16ba5294664512597fd810814b3cba56aa3d5e0b3fc3d163fed2b98078d02b9f

Tx prefix hash: aac34e343b061ad2ac01cb950cefc35664c588b6e82fe226ae1ee5568524e370
Tx public key: 517b6efb5f79d9d81a5a006faecd3a69b98db6ddcee5d6a8ef3bae38e9f27011
Payment id: ae38261d63f9f2e581cffae63be6a672b7a8cbfbf2fed69b3d248b405b50c4fb

Transaction 16ba5294664512597fd810814b3cba56aa3d5e0b3fc3d163fed2b98078d02b9f was carried out on the Monero network on 2015-06-11 19:10:33. The transaction has 2699349 confirmations. Total output fee is 0.016207308272 XMR.

Timestamp: 1434049833 Timestamp [UTC]: 2015-06-11 19:10:33 Age [y:d:h:m:s]: 09:189:05:40:43
Block: 603755 Fee (per_kB): 0.016207308272 (0.034503708255) Tx size: 0.4697 kB
Tx version: 1 No of confirmations: 2699349 RingCT/type: no
Extra: 022100ae38261d63f9f2e581cffae63be6a672b7a8cbfbf2fed69b3d248b405b50c4fb01517b6efb5f79d9d81a5a006faecd3a69b98db6ddcee5d6a8ef3bae38e9f27011

5 output(s) for total of 9.990000000000 xmr

stealth address amount amount idx tag
00: bb6bb638454d8cd3727fa88606428a53f88a8cd1fe714821069a3fc47f46e3c4 0.090000000000 164447 of 317822 -
01: 49afd92b45e482f23eb604482319cb9a2c814080129cc014db83769121bf0001 0.400000000000 430903 of 688584 -
02: 4fee019e12dd0a713061192f6712d8739364f23362a78c9323959c2f50d5e447 0.500000000000 774331 of 1118624 -
03: 654689b841b1bbd38c4b96aad61da08926f9ad4f06c9333574e7738a5352fb82 4.000000000000 164362 of 237197 -
04: ba70c3cafa1f8f75d07df6b178c0eb0c3f49889783913610389a31cc7337c176 5.000000000000 172882 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-06-01 11:50:52 till 2015-06-11 19:22:41; resolution: 0.06 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 10.006207308272 xmr

key image 00: 963b0af0b8bd4b5366802f761267e8d6ea2d4e001cefedf4ffa1c83c574ce6c9 amount: 0.006207308272
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 771ec3bf6db66b760c74d2497e57b69ed132f91cb9e5ce30846a2eda69519419 00589089 0 0/3 2015-06-01 12:50:52 09:199:12:00:24
key image 01: b2a290881a1bd7520a144a4693d8f9ca139085d74c99c83b5924763aa940c252 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e3ae1b10872106823d1b9e699a7763d04c747a936c9ac84b0c3277b399621e04 00603691 0 0/3 2015-06-11 18:22:41 09:189:06:28:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6207308272, "key_offsets": [ 0 ], "k_image": "963b0af0b8bd4b5366802f761267e8d6ea2d4e001cefedf4ffa1c83c574ce6c9" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 681440 ], "k_image": "b2a290881a1bd7520a144a4693d8f9ca139085d74c99c83b5924763aa940c252" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "bb6bb638454d8cd3727fa88606428a53f88a8cd1fe714821069a3fc47f46e3c4" } }, { "amount": 400000000000, "target": { "key": "49afd92b45e482f23eb604482319cb9a2c814080129cc014db83769121bf0001" } }, { "amount": 500000000000, "target": { "key": "4fee019e12dd0a713061192f6712d8739364f23362a78c9323959c2f50d5e447" } }, { "amount": 4000000000000, "target": { "key": "654689b841b1bbd38c4b96aad61da08926f9ad4f06c9333574e7738a5352fb82" } }, { "amount": 5000000000000, "target": { "key": "ba70c3cafa1f8f75d07df6b178c0eb0c3f49889783913610389a31cc7337c176" } } ], "extra": [ 2, 33, 0, 174, 56, 38, 29, 99, 249, 242, 229, 129, 207, 250, 230, 59, 230, 166, 114, 183, 168, 203, 251, 242, 254, 214, 155, 61, 36, 139, 64, 91, 80, 196, 251, 1, 81, 123, 110, 251, 95, 121, 217, 216, 26, 90, 0, 111, 174, 205, 58, 105, 185, 141, 182, 221, 206, 229, 214, 168, 239, 59, 174, 56, 233, 242, 112, 17 ], "signatures": [ "0a44a54cd361aed0d72477e3ef74932aefda26c893ac8668f889ca85082491023243efdf69082690e564e5ff0efe2ff6ed46d36042477be6fd9e9f8f64319a0e", "9e93ad17a66f5000f51b35ab6a16fca2302874f858f86a92935200da614704064be1e60557d0480337b8e93b1cc1ad622708bbc4f450a121ba7a7fac1e0c0b0e"] }


Less details
source code | moneroexplorer