Monero Transaction 1b0d61f759885099f363f2ac572e1d744736475c39fe00ecb89ca37fc4a73d6f

Autorefresh is OFF

Tx hash: 1b0d61f759885099f363f2ac572e1d744736475c39fe00ecb89ca37fc4a73d6f

Tx prefix hash: e67ff7807d36e2248f9a8347125b1d80a4cebd36042dd36a8e7cc90ba2333432
Tx public key: b542da636007e99c094d10cacd2fb5e5311b614f4813fe330be308e6a6860284
Payment id: abd8624ba1b49b3279aec90c702395e76abc6f140477259963c0111e668fda5f

Transaction 1b0d61f759885099f363f2ac572e1d744736475c39fe00ecb89ca37fc4a73d6f was carried out on the Monero network on 2014-07-28 18:17:10. The transaction has 3129402 confirmations. Total output fee is 0.016727320000 XMR.

Timestamp: 1406571430 Timestamp [UTC]: 2014-07-28 18:17:10 Age [y:d:h:m:s]: 10:107:17:46:46
Block: 148909 Fee (per_kB): 0.016727320000 (0.035759448184) Tx size: 0.4678 kB
Tx version: 1 No of confirmations: 3129402 RingCT/type: no
Extra: 022100abd8624ba1b49b3279aec90c702395e76abc6f140477259963c0111e668fda5f01b542da636007e99c094d10cacd2fb5e5311b614f4813fe330be308e6a6860284

5 output(s) for total of 0.689272680000 xmr

stealth address amount amount idx tag
00: 8267049008b6e7b77643e4953f477ce241ee6b6c3eb046497b139839178ae95b 0.009272680000 0 of 1 -
01: efa054ce7da1112ba4a3613af16e45d83686a8f2c8f7b32b09a1df5db46e2fdb 0.010000000000 319779 of 502466 -
02: fcffd569b38d9f4eb24994da437c1ad898613de9dd02ae8179408c788a803142 0.070000000000 88349 of 263947 -
03: 1bba49fe304a09cb89a00aa69b5aa75f2c8bf16399878dced5e61c512b6afd8f 0.200000000000 274439 of 1272210 -
04: 68cb0bdc1271bf57a3bf3cea8c5602b669062c5de17eb229adc940d1253100b3 0.400000000000 119362 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-11 06:34:41 till 2014-07-17 07:21:19; resolution: 0.04 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.706000000000 xmr

key image 00: 92b6e8e2b1ead2ec5dbc0cd24b7dc6fe13abe497026255d3e465c9532e2497fa amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 398a546dfb9220e778596d3ebc75822de1b64a06df0e6fa5244aa5807005fca1 00132288 1 1/9 2014-07-17 06:21:19 10:119:05:42:37
key image 01: cced89bb580114f94f6af9d1dba7eb9387da2c70a5c37f8ea5c1cf854ac9e796 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bfb7e723c3dcc08a32fd4db6f5a0868b99e32d494f8f9b1470dcd9073ee21a89 00123707 1 15/4 2014-07-11 07:34:41 10:125:04:29:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6000000000, "key_offsets": [ 171021 ], "k_image": "92b6e8e2b1ead2ec5dbc0cd24b7dc6fe13abe497026255d3e465c9532e2497fa" } }, { "key": { "amount": 700000000000, "key_offsets": [ 61151 ], "k_image": "cced89bb580114f94f6af9d1dba7eb9387da2c70a5c37f8ea5c1cf854ac9e796" } } ], "vout": [ { "amount": 9272680000, "target": { "key": "8267049008b6e7b77643e4953f477ce241ee6b6c3eb046497b139839178ae95b" } }, { "amount": 10000000000, "target": { "key": "efa054ce7da1112ba4a3613af16e45d83686a8f2c8f7b32b09a1df5db46e2fdb" } }, { "amount": 70000000000, "target": { "key": "fcffd569b38d9f4eb24994da437c1ad898613de9dd02ae8179408c788a803142" } }, { "amount": 200000000000, "target": { "key": "1bba49fe304a09cb89a00aa69b5aa75f2c8bf16399878dced5e61c512b6afd8f" } }, { "amount": 400000000000, "target": { "key": "68cb0bdc1271bf57a3bf3cea8c5602b669062c5de17eb229adc940d1253100b3" } } ], "extra": [ 2, 33, 0, 171, 216, 98, 75, 161, 180, 155, 50, 121, 174, 201, 12, 112, 35, 149, 231, 106, 188, 111, 20, 4, 119, 37, 153, 99, 192, 17, 30, 102, 143, 218, 95, 1, 181, 66, 218, 99, 96, 7, 233, 156, 9, 77, 16, 202, 205, 47, 181, 229, 49, 27, 97, 79, 72, 19, 254, 51, 11, 227, 8, 230, 166, 134, 2, 132 ], "signatures": [ "a96e4786de147c6356b528d655f37ea452b24079fa795c8a693064efd0d60507f490c3c13c1160f76820465f9322b0951ebd8c15fbb024fd2d9de407b7d5740b", "7a438425b79638b00d5ecd42413fe4fff8a219bd95e6355a14ffb33ebb688909986ebb7e9836b74d0ee8185a7e85f3709a864dac11dd32a8ee346c16e92e7c05"] }


Less details
source code | moneroexplorer