Monero Transaction 16d7c8ca56ce0a0306dc2a2273bee03dfb960f1e4daf7dc91682d0cc67feb4d9

Autorefresh is OFF

Tx hash: 16d7c8ca56ce0a0306dc2a2273bee03dfb960f1e4daf7dc91682d0cc67feb4d9

Tx prefix hash: 6038e232ce9c3e28e6298a1fa638622c9f8e7b4585054b9dc5b957366e4d9a72
Tx public key: e30613be3d5d79c2d426a97e0d9d39aefbfcf64d11cbe86b6ea4abcd62b13806
Payment id: d03ad1e26631703eaf007b4a8189dc08074824e5962c556d7fc61d019af2671b

Transaction 16d7c8ca56ce0a0306dc2a2273bee03dfb960f1e4daf7dc91682d0cc67feb4d9 was carried out on the Monero network on 2016-10-16 08:12:20. The transaction has 2144725 confirmations. Total output fee is 0.030000000000 XMR.

Timestamp: 1476605540 Timestamp [UTC]: 2016-10-16 08:12:20 Age [y:d:h:m:s]: 08:061:21:47:36
Block: 1158563 Fee (per_kB): 0.030000000000 (0.047850467290) Tx size: 0.6270 kB
Tx version: 1 No of confirmations: 2144725 RingCT/type: no
Extra: 022100d03ad1e26631703eaf007b4a8189dc08074824e5962c556d7fc61d019af2671b01e30613be3d5d79c2d426a97e0d9d39aefbfcf64d11cbe86b6ea4abcd62b13806

5 output(s) for total of 79.970000000000 xmr

stealth address amount amount idx tag
00: fb559a9c83d6a46ce12cd0d0383cdea0adaca669aea8512883d24e713e1fd63f 0.070000000000 231199 of 263947 -
01: 6106bfc576cb292457d0764b9a2889e8f142836848e817c6879f43595c1a976f 0.900000000000 408878 of 454894 -
02: 1ca4a0dfed11994e85e9678d329ced34d116781dae93d0f33f42b0600bdd6670 9.000000000000 203687 of 274259 -
03: 5f7a16dd0b6cb916ef2aa2fbfe1cc35459c9d65bac5a041425ecdb5874e311aa 20.000000000000 68955 of 78991 -
04: b33302c2c280331a6870b3b3c98e5e461b5adc065cfa2374388fe24a5728997f 50.000000000000 36895 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-04 00:02:29 till 2016-10-16 08:52:58; resolution: 3.65 days)

  • |_*________________________________________*______________________________________________________________________________________________*_________*_____________________*|

1 inputs(s) for total of 80.000000000000 xmr

key image 00: f34f72907de680dbf4ec3e1df9233c848a11bd3072040efade5cb070a5bd8dd6 amount: 80.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3404d670dc7eadd3e88f9b03653130df8a3d5ae561a0d7334149170cd58fae03 00420863 1 176/5 2015-02-04 01:02:29 09:317:04:57:27
- 01: 767fadb91047b40122e22ada912dbbcc5969dda051fa71c8565f43e7b2ca3b5c 00638486 1 9/6 2015-07-06 03:21:29 09:165:02:38:27
- 02: 50ec3eb7d6efb49550d73502c31e670f72859bf17c784dbeeb56fe9ee143307a 01072953 3 12/6 2016-06-19 11:49:52 08:180:18:10:04
- 03: 86abd545f483cc3c519992532b6edb66faf2ae219ab52b9fbc3162eaef0d4a02 01098048 11 47/6 2016-07-24 06:58:51 08:145:23:01:05
- 04: d2063897e48d1ef34aed3cad62c89a3039c2a2f27b07e6550d56c5945082c9b4 01158546 5 2/5 2016-10-16 07:52:58 08:061:22:06:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000000, "key_offsets": [ 4844, 2616, 6660, 688, 4628 ], "k_image": "f34f72907de680dbf4ec3e1df9233c848a11bd3072040efade5cb070a5bd8dd6" } } ], "vout": [ { "amount": 70000000000, "target": { "key": "fb559a9c83d6a46ce12cd0d0383cdea0adaca669aea8512883d24e713e1fd63f" } }, { "amount": 900000000000, "target": { "key": "6106bfc576cb292457d0764b9a2889e8f142836848e817c6879f43595c1a976f" } }, { "amount": 9000000000000, "target": { "key": "1ca4a0dfed11994e85e9678d329ced34d116781dae93d0f33f42b0600bdd6670" } }, { "amount": 20000000000000, "target": { "key": "5f7a16dd0b6cb916ef2aa2fbfe1cc35459c9d65bac5a041425ecdb5874e311aa" } }, { "amount": 50000000000000, "target": { "key": "b33302c2c280331a6870b3b3c98e5e461b5adc065cfa2374388fe24a5728997f" } } ], "extra": [ 2, 33, 0, 208, 58, 209, 226, 102, 49, 112, 62, 175, 0, 123, 74, 129, 137, 220, 8, 7, 72, 36, 229, 150, 44, 85, 109, 127, 198, 29, 1, 154, 242, 103, 27, 1, 227, 6, 19, 190, 61, 93, 121, 194, 212, 38, 169, 126, 13, 157, 57, 174, 251, 252, 246, 77, 17, 203, 232, 107, 110, 164, 171, 205, 98, 177, 56, 6 ], "signatures": [ "635003d3e42683299f37963f2ead61d40164fbc31952b98ed76cfde992f4fb02b7f8fc05938faf59276e198949ecb2b4cb2cbac7ef96291236ff58219806f106caa44df6ea6969a3f4f2a1c6bbd3019622de9ca6d08c52c3cbeaba5fa0396d05d08a568b6ab1d0f29af1684723f02defa91129cdbd1bf568c21a002cfd8e6a0b73655d2982eee9ad8d8a24c586887d9d8312b2ec3753a2d29f50e61bc285bf06e2d6c5380c08a5f908552670ababdb58d1939495b7c252417c67b13af734b80888f60fedaf309c2e2e7d8ba70873be65dd2013528647af3101e6189033beaa0990f10bb8db21454831685dfbca205d8cf60d38e010d8955dff0bb2831ae5b205c9f480bfce400dfe7de1cf19541bcb4c9888867886c4330f9d260d2f5db9cd04d0d9bf7cea50f2da9fbc283aa76e220658eea9b5ffa9dbf182f633cf56766c0e"] }


Less details
source code | moneroexplorer