Monero Transaction 16df7051342c82cc21c4464b062aa96374122678136923a9a2e1a143874ede5c

Autorefresh is OFF

Tx hash: 16df7051342c82cc21c4464b062aa96374122678136923a9a2e1a143874ede5c

Tx prefix hash: 95773d60b1e7fd339f7331a23f926d287933cc7ebbb1f161f78ed3096f3aa2e0
Tx public key: 21451ac2e7af81e94d28ce79c9b0e81af65c82601a40deb67a632715cfc3c645

Transaction 16df7051342c82cc21c4464b062aa96374122678136923a9a2e1a143874ede5c was carried out on the Monero network on 2014-06-09 20:31:15. The transaction has 3215331 confirmations. Total output fee is 0.000010711017 XMR.

Timestamp: 1402345875 Timestamp [UTC]: 2014-06-09 20:31:15 Age [y:d:h:m:s]: 10:177:13:17:57
Block: 78044 Fee (per_kB): 0.000010711017 (0.000010679729) Tx size: 1.0029 kB
Tx version: 1 No of confirmations: 3215331 RingCT/type: no
Extra: 0121451ac2e7af81e94d28ce79c9b0e81af65c82601a40deb67a632715cfc3c645

12 output(s) for total of 67.000189640000 xmr

stealth address amount amount idx tag
00: 30018a1b573b511ef91df494271edc7820621c28d5278c6921996f66c06b9fbe 0.000009640000 0 of 1 -
01: e85521ca9d0178613fa1565a5e6ca18420c50d9d8e4daeffa2c6998db98657e7 0.000090000000 32962 of 61123 -
02: e0c8f2cbba0b827c3a29ac84fc5916dcb0062374bbcddba0b46fdbcd7404bb3c 0.000090000000 32963 of 61123 -
03: 41e9f1c14bd65c7bdfbcf5ec7825cbcac336a26bc18551e284525e24e42482d7 0.000500000000 32006 of 77939 -
04: cbab3a340dfae506a55b7eb84a08ec9751b9ba41b4be7e9884b70a5b01b212c8 0.000500000000 32007 of 77939 -
05: 48f74ec40f704ce81b8231c9172b20d48dc59a233ca4010767b4cc0e65c7568c 0.009000000000 65061 of 233398 -
06: 1686357db94bd2de984e92fb230b4041a1829235d9e7069287c6a562231e5de8 0.090000000000 30759 of 317822 -
07: ffeb84c4fe66ea42c99bf0dbbc3403b3e52b3ec8473c532e0aa1cf7469c23b7f 0.200000000000 31932 of 1272210 -
08: dde48242f1b584df9955762093290c9b6a2822129111093196968d80631981a6 0.700000000000 14257 of 514467 -
09: 605c5d9d2cc45d61652fe60a708580bbcc372eefd4da5a7645ebea910a8dc913 6.000000000000 41660 of 207703 -
10: e6bf1d2d34a7a5976b6b486a814cf34c700815a728384d58f28522425e5d1de3 10.000000000000 80381 of 921411 -
11: 53347b17708443dff99cacc71971afe66d42d8bb3dfa5e67897528bf9fec42b7 50.000000000000 1095 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-25 20:23:13 till 2014-06-09 18:03:58; resolution: 0.09 days)

  • |________________________________________________________________________________________________________________________________________*_________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|

5 inputs(s) for total of 67.000200351017 xmr

key image 00: add5b02accb5ebd61a3c670929672e9c688f8831e63340990e838ac7a22052c7 amount: 0.000000351017
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 935b529ade1f7f13d782d32d6b83e83c76bd96ef6432ea3a027f7e0c00e90746 00073759 1 16/286 2014-06-06 19:55:11 10:180:13:54:01
key image 01: ae7aefef7e565e2f63f5c1d4fa69426b9825c6fe12345cb1c37773e885134ce1 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ce53d3f8722e34b92163cd8ce79ca6295dfe9fcdda79ae223a6829be3e815bfb 00077854 1 16/14 2014-06-09 17:03:58 10:177:16:45:14
key image 02: 36a03c6b9f09c7a306e652c1fa75d542229087b106b0ae7ce9307b3159014eb9 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3cf86e516095cfbf9bc0360d120e9f5430c6dbbb4b78672b69bfe8a66fb8d3b8 00077365 1 225/3 2014-06-09 08:49:38 10:178:00:59:34
key image 03: 5eb32096fe3576adea03b5aca0dd0cd5ec578b04196ac5a1d7b2930859cfc9c1 amount: 0.000200000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1e61afa08aed1b8d922b00dfcab68a38a7a9b2cadae80142999da9a778013d6a 00056372 1 6/170 2014-05-25 21:23:13 10:192:12:25:59
key image 04: 6dd9f5f0a0ef79412beca34aad0de35f122d94fa8f5446c89aaf7521f88fd9af amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3bf65658ef38cf3f5d273af940becd57c496f849ead5a4e725e41a0a0bcfbfb3 00076364 1 144/7 2014-06-08 15:45:14 10:178:18:03:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 351017, "key_offsets": [ 5 ], "k_image": "add5b02accb5ebd61a3c670929672e9c688f8831e63340990e838ac7a22052c7" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 2808 ], "k_image": "ae7aefef7e565e2f63f5c1d4fa69426b9825c6fe12345cb1c37773e885134ce1" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 3603 ], "k_image": "36a03c6b9f09c7a306e652c1fa75d542229087b106b0ae7ce9307b3159014eb9" } }, { "key": { "amount": 200000000, "key_offsets": [ 16147 ], "k_image": "5eb32096fe3576adea03b5aca0dd0cd5ec578b04196ac5a1d7b2930859cfc9c1" } }, { "key": { "amount": 50000000000000, "key_offsets": [ 1043 ], "k_image": "6dd9f5f0a0ef79412beca34aad0de35f122d94fa8f5446c89aaf7521f88fd9af" } } ], "vout": [ { "amount": 9640000, "target": { "key": "30018a1b573b511ef91df494271edc7820621c28d5278c6921996f66c06b9fbe" } }, { "amount": 90000000, "target": { "key": "e85521ca9d0178613fa1565a5e6ca18420c50d9d8e4daeffa2c6998db98657e7" } }, { "amount": 90000000, "target": { "key": "e0c8f2cbba0b827c3a29ac84fc5916dcb0062374bbcddba0b46fdbcd7404bb3c" } }, { "amount": 500000000, "target": { "key": "41e9f1c14bd65c7bdfbcf5ec7825cbcac336a26bc18551e284525e24e42482d7" } }, { "amount": 500000000, "target": { "key": "cbab3a340dfae506a55b7eb84a08ec9751b9ba41b4be7e9884b70a5b01b212c8" } }, { "amount": 9000000000, "target": { "key": "48f74ec40f704ce81b8231c9172b20d48dc59a233ca4010767b4cc0e65c7568c" } }, { "amount": 90000000000, "target": { "key": "1686357db94bd2de984e92fb230b4041a1829235d9e7069287c6a562231e5de8" } }, { "amount": 200000000000, "target": { "key": "ffeb84c4fe66ea42c99bf0dbbc3403b3e52b3ec8473c532e0aa1cf7469c23b7f" } }, { "amount": 700000000000, "target": { "key": "dde48242f1b584df9955762093290c9b6a2822129111093196968d80631981a6" } }, { "amount": 6000000000000, "target": { "key": "605c5d9d2cc45d61652fe60a708580bbcc372eefd4da5a7645ebea910a8dc913" } }, { "amount": 10000000000000, "target": { "key": "e6bf1d2d34a7a5976b6b486a814cf34c700815a728384d58f28522425e5d1de3" } }, { "amount": 50000000000000, "target": { "key": "53347b17708443dff99cacc71971afe66d42d8bb3dfa5e67897528bf9fec42b7" } } ], "extra": [ 1, 33, 69, 26, 194, 231, 175, 129, 233, 77, 40, 206, 121, 201, 176, 232, 26, 246, 92, 130, 96, 26, 64, 222, 182, 122, 99, 39, 21, 207, 195, 198, 69 ], "signatures": [ "d41cea48b904dc93e848bd573ca9fad43a204d13b753d21cb48107598f1e070146b80bd60baf7943bf5cf2d37d8685e2a87a1b18491b5931ba25bc5057bbff0a", "70ab28e0d9e1564790389c364d939d5f168cb3d4ae39d975b606f57f059f9201e3b6e678d69d92fd837e606bccbad6d845bf0ad96260cc2358bd16e1f4c4590f", "ab237192a0403e8a21ef5d34fce655d0cf426c93b0b4d2a4c0d22c6ad78eed00aab172b22a6d454e95fd8319694846d368ba7c99fa011dab891db69810abc602", "4bcc355ffc4880638accb04c3142565704ca7d2facf3fb83ca9d54aad243df0c849eac2544d81610ec9f6a2107df9b2e55a04bbee248fb8f9d3ef3544f89960b", "e8118794afacb5512c03924e0c428597d8072fb78bed09a5289cc273401d9d0ff1b0c665c4dc230e509e4417bc29bf648895bb51e54a55200f371ab207a45c0f"] }


Less details
source code | moneroexplorer