Monero Transaction 16ff357a5e4af29c55f425a3cf6087a5a04bef4ad339d6b135eeddd8b1cb2bfe

Autorefresh is OFF

Tx hash: 16ff357a5e4af29c55f425a3cf6087a5a04bef4ad339d6b135eeddd8b1cb2bfe

Tx prefix hash: c21f9ea86f6db6cec1084161361fa8748f2802907473cb420ce37d7d48cabcc8
Tx public key: ebd9ad361982eb79a3f8722c64ba1e3fddd57156aa537f2b3c7c130445f5ccbd
Payment id: 7346ab07a5b2b37db39f905bd839728556352440e6e22e14530f20f3f2367cb3

Transaction 16ff357a5e4af29c55f425a3cf6087a5a04bef4ad339d6b135eeddd8b1cb2bfe was carried out on the Monero network on 2014-07-20 07:38:13. The transaction has 3141671 confirmations. Total output fee is 0.007000000000 XMR.

Timestamp: 1405841893 Timestamp [UTC]: 2014-07-20 07:38:13 Age [y:d:h:m:s]: 10:116:07:29:02
Block: 136731 Fee (per_kB): 0.007000000000 (0.010762762763) Tx size: 0.6504 kB
Tx version: 1 No of confirmations: 3141671 RingCT/type: no
Extra: 0221007346ab07a5b2b37db39f905bd839728556352440e6e22e14530f20f3f2367cb301ebd9ad361982eb79a3f8722c64ba1e3fddd57156aa537f2b3c7c130445f5ccbd

7 output(s) for total of 30.010000000000 xmr

stealth address amount amount idx tag
00: 6e13a90a24953a31cdbe01e9e0238b69c10497a945de8253ee0c7b4b8508f8e1 0.020000000000 201011 of 381491 -
01: 48a79f3045dc6022aa4ada64833557c8cf620c4d63bb9600654fb9b1ed145df6 0.090000000000 84971 of 317822 -
02: e9c166797225d483f4ad4c06446e1cf83b135856f46a36eb9c7abaef9573ae35 0.300000000000 109125 of 976536 -
03: d093e6f176f605adb5a2a321d39f53215cf6e89dd9b5466ccd2aba9405be09d5 0.600000000000 96391 of 650760 -
04: 8a21f36b7efa722f0937b551cc80bfef08d889ba31d95816780aa6b272505282 1.000000000000 118072 of 874629 -
05: 979d62d87ec937fe2b91e6805142ab5ee800033aa0051097ad3be4f488a398b4 8.000000000000 9904 of 226902 -
06: af2ba266330e777725115970ee45f354bc6b63a52cdcd1b7820a18b6f4a16a51 20.000000000000 6613 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-19 12:28:59 till 2014-07-20 06:05:22; resolution: 0.00 days)

  • |_____________________________________________________________*____________________________________________________________________________________________________________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|

3 inputs(s) for total of 30.017000000000 xmr

key image 00: 40fff5ea4a2f0e621cd96ee768d4c34f5da7af2d3f46d979efc175b76ae931be amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 539aa3995130282d52c16af8ba2e709e37f38cea4927ba434af08480ad1ceebd 00135984 1 1/9 2014-07-19 18:49:47 10:116:20:17:28
key image 01: 283ca659340145c3c4bb75f172165b6cc2245616e96b404e8a5bfb0c95d3f3fb amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: becb317dbc171a985e2738b7866c3590e352a6d7b3b817549b5715ea0a6a629a 00135643 1 4/6 2014-07-19 13:28:59 10:117:01:38:16
key image 02: f18bbb72c5a81f04d8e12522a76bafe9d4f16738a8e2d8644b1438554dd7fe08 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9ee001f43f54a2855d4385d0d8e2e6d34491fadbd89de284f78f74ea6a62eb0a 00136599 1 1/6 2014-07-20 05:05:22 10:116:10:01:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 155953 ], "k_image": "40fff5ea4a2f0e621cd96ee768d4c34f5da7af2d3f46d979efc175b76ae931be" } }, { "key": { "amount": 9000000000, "key_offsets": [ 150482 ], "k_image": "283ca659340145c3c4bb75f172165b6cc2245616e96b404e8a5bfb0c95d3f3fb" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 3532 ], "k_image": "f18bbb72c5a81f04d8e12522a76bafe9d4f16738a8e2d8644b1438554dd7fe08" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "6e13a90a24953a31cdbe01e9e0238b69c10497a945de8253ee0c7b4b8508f8e1" } }, { "amount": 90000000000, "target": { "key": "48a79f3045dc6022aa4ada64833557c8cf620c4d63bb9600654fb9b1ed145df6" } }, { "amount": 300000000000, "target": { "key": "e9c166797225d483f4ad4c06446e1cf83b135856f46a36eb9c7abaef9573ae35" } }, { "amount": 600000000000, "target": { "key": "d093e6f176f605adb5a2a321d39f53215cf6e89dd9b5466ccd2aba9405be09d5" } }, { "amount": 1000000000000, "target": { "key": "8a21f36b7efa722f0937b551cc80bfef08d889ba31d95816780aa6b272505282" } }, { "amount": 8000000000000, "target": { "key": "979d62d87ec937fe2b91e6805142ab5ee800033aa0051097ad3be4f488a398b4" } }, { "amount": 20000000000000, "target": { "key": "af2ba266330e777725115970ee45f354bc6b63a52cdcd1b7820a18b6f4a16a51" } } ], "extra": [ 2, 33, 0, 115, 70, 171, 7, 165, 178, 179, 125, 179, 159, 144, 91, 216, 57, 114, 133, 86, 53, 36, 64, 230, 226, 46, 20, 83, 15, 32, 243, 242, 54, 124, 179, 1, 235, 217, 173, 54, 25, 130, 235, 121, 163, 248, 114, 44, 100, 186, 30, 63, 221, 213, 113, 86, 170, 83, 127, 43, 60, 124, 19, 4, 69, 245, 204, 189 ], "signatures": [ "04f4dbc008e961525a489c1388b0a731e91f659f7d12798c1b2d2fe5c9213b0a43fef4979a99ee7d64903a851be0ec89b53379774655c5a09dc73772123fd400", "9b922f9e8e0b0d54b401e9a83ee316cdc6446988d58a7b995f714949abc4a1032453d48ba231bca9ed63b3b88896259ea830de1097ab89f19e1f8d3b472f990b", "67dd13f49c8af4e9d2e51c9c530b21ac90ccb38eda4e5f09b27ab65c83b4410ab094838782ef3ae6ee3d4bedd80590e6bf57843e9d7efefc9fc7af63a1bb290b"] }


Less details
source code | moneroexplorer