Monero Transaction 4b6b973b174d531efe9c8a89cf1432386c8ddfa7b3bc344818e6db908ce2223b

Autorefresh is OFF

Tx hash: 4b6b973b174d531efe9c8a89cf1432386c8ddfa7b3bc344818e6db908ce2223b

Tx prefix hash: 71dbab1425586ca32aa06659445f15445c717066ce2bd0e0acbd5646e6346a27
Tx public key: 2e695dd7203c7435ce10da9af911a7b7f3411f938dbb68ee54384236d36b8963
Payment id: 2ba548a383381570dd2e016f28f9ead6c259e13dd2978d2f11bcc67e587bef1d

Transaction 4b6b973b174d531efe9c8a89cf1432386c8ddfa7b3bc344818e6db908ce2223b was carried out on the Monero network on 2014-05-29 01:54:25. The transaction has 3240047 confirmations. Total output fee is 0.005040000000 XMR.

Timestamp: 1401328465 Timestamp [UTC]: 2014-05-29 01:54:25 Age [y:d:h:m:s]: 10:200:08:38:10
Block: 61208 Fee (per_kB): 0.005040000000 (0.005715348837) Tx size: 0.8818 kB
Tx version: 1 No of confirmations: 3240047 RingCT/type: no
Extra: 0221002ba548a383381570dd2e016f28f9ead6c259e13dd2978d2f11bcc67e587bef1d012e695dd7203c7435ce10da9af911a7b7f3411f938dbb68ee54384236d36b8963

5 output(s) for total of 7.915000000000 xmr

stealth address amount amount idx tag
00: 45b2fd0c61494bb6d2ed6b0cdaeb7788fe684cddd94591e4843c4a9d51619174 0.005000000000 28417 of 308585 -
01: 9559c035773f68bce8e7deee55ab0d9f36e3d5c59c55eb0da56c8a349f66cef5 0.010000000000 47538 of 502466 -
02: 21e632479614ad8785f8e0fed9df380dc5165c81d80ade5effc8ffb427df5ae7 0.900000000000 8969 of 454894 -
03: 56c182ac50ff1ce3a9f95c1eb34f7e35a3953048d9f33b4a82d988509607b60f 2.000000000000 2739 of 434058 -
04: eafbec47e651ba3b3d89d19e8c3458e25375c20279dbd6b0ea0ef7dd5b50d56d 5.000000000000 2326 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-24 05:09:50 till 2014-05-29 02:34:41; resolution: 0.03 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

6 inputs(s) for total of 7.920040000000 xmr

key image 00: d2df9cecd0bb6209dcd72d1bbe1d4b91ec65113b3f1aa07ce9ae5d0b169fb926 amount: 0.000040000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3ebe5be584b2e56e8057fcef218e4f7ca11e0af93e8213a310a9972b63215ef4 00054050 1 17/701 2014-05-24 06:09:50 10:205:04:22:45
key image 01: 8d59df6ba2c4b6c7c64d17ba4b195be414bbd97dc3f25ed8143222a132ba8ec7 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8a68d0fc6ea674c0f2fad92f5f00b6b49d6f79141685cd86433bcb7420e6f03a 00061151 1 84/4 2014-05-29 01:02:50 10:200:09:29:45
key image 02: c0285f59ac60e92c45e50f9a0b87d3fec7b82c6dc5311be8bbd05653b9f801a2 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c29f538a1c7f6dcee2964ce7c09314994ce66ec3dca80fbc2378b246bf6250b6 00061188 1 6/3 2014-05-29 01:32:46 10:200:08:59:49
key image 03: 3d6f4df7c44caa2ab84a03d680198b40c5b777b6dc6744f24307b1df80921326 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7488177a71e9e2e2b39dc2947cc3b756fba63ea0a8d48764c77be6dc2d67273f 00061188 1 6/3 2014-05-29 01:32:46 10:200:08:59:49
key image 04: f2cb374e97cb52a17460caac2d0807ef4731c3a95a192cc00dbed7f727d1cb69 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 686517686a3b9b9ad3e10e8b3a5856a3d0da752f2a208ce0d0e4230c5e2b3e7e 00061190 1 3/4 2014-05-29 01:34:41 10:200:08:57:54
key image 05: 0dd5ac816ce91f48aef906490fda4f71ed347033c6ad7f5fe20312587091c6e2 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6de04aea740fe9bb645fcd066a233dba6e1ed63ef68e88862e99e57fe7e7bc81 00061190 1 3/4 2014-05-29 01:34:41 10:200:08:57:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000, "key_offsets": [ 10694 ], "k_image": "d2df9cecd0bb6209dcd72d1bbe1d4b91ec65113b3f1aa07ce9ae5d0b169fb926" } }, { "key": { "amount": 90000000000, "key_offsets": [ 12125 ], "k_image": "8d59df6ba2c4b6c7c64d17ba4b195be414bbd97dc3f25ed8143222a132ba8ec7" } }, { "key": { "amount": 20000000000, "key_offsets": [ 29709 ], "k_image": "c0285f59ac60e92c45e50f9a0b87d3fec7b82c6dc5311be8bbd05653b9f801a2" } }, { "key": { "amount": 800000000000, "key_offsets": [ 8543 ], "k_image": "3d6f4df7c44caa2ab84a03d680198b40c5b777b6dc6744f24307b1df80921326" } }, { "key": { "amount": 10000000000, "key_offsets": [ 47453 ], "k_image": "f2cb374e97cb52a17460caac2d0807ef4731c3a95a192cc00dbed7f727d1cb69" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 36432 ], "k_image": "0dd5ac816ce91f48aef906490fda4f71ed347033c6ad7f5fe20312587091c6e2" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "45b2fd0c61494bb6d2ed6b0cdaeb7788fe684cddd94591e4843c4a9d51619174" } }, { "amount": 10000000000, "target": { "key": "9559c035773f68bce8e7deee55ab0d9f36e3d5c59c55eb0da56c8a349f66cef5" } }, { "amount": 900000000000, "target": { "key": "21e632479614ad8785f8e0fed9df380dc5165c81d80ade5effc8ffb427df5ae7" } }, { "amount": 2000000000000, "target": { "key": "56c182ac50ff1ce3a9f95c1eb34f7e35a3953048d9f33b4a82d988509607b60f" } }, { "amount": 5000000000000, "target": { "key": "eafbec47e651ba3b3d89d19e8c3458e25375c20279dbd6b0ea0ef7dd5b50d56d" } } ], "extra": [ 2, 33, 0, 43, 165, 72, 163, 131, 56, 21, 112, 221, 46, 1, 111, 40, 249, 234, 214, 194, 89, 225, 61, 210, 151, 141, 47, 17, 188, 198, 126, 88, 123, 239, 29, 1, 46, 105, 93, 215, 32, 60, 116, 53, 206, 16, 218, 154, 249, 17, 167, 183, 243, 65, 31, 147, 141, 187, 104, 238, 84, 56, 66, 54, 211, 107, 137, 99 ], "signatures": [ "e292b0c7c8c5f594a372ec19a80012e39079383d52ac8e2865e14e098b1d260c14426c9502b1a927573bcc07d84ac133e29d1de630940287abf3baa9d3967f0f", "b4f28f89cd2699b2f94497314ae0407c2b2c4bbad49441f9173fe10f82078b04d48069ba7f11d522a0660b58b42cbd490eea84ddc70f54788529dcc348c4af0e", "ac43036b1beb597dd4eda2bf262c0fee72f4e6b11844a4130ae54eab10553f04dd2fdacd5109f039c7c3edf5195fda9178bdbda24ab662bad6935e25deb6140d", "7f5390dcef2c4121ac391f5c92198dcf12905861624c0707084e1ec5c821d80d6b59cfd3c7c99b756103230bee1624974ec6a7b6e8b04e4b247915b6f4356406", "5b7c60e37a95e499fc9a72b618d9ed0c26889c434a42bc2d8779991fae4a460f747cfb7eec06753d1cac7c14aa6b34bf27ea376bdcec429eb8db11ec3b562d0d", "20015caa1f69e11c020b5055cc75101360e1bde04db07e80d94e1b0d8a0f630671e5e5b5c3a251246043ebcd0517f4540ce80dd9b889e398c5aa874559f21b0b"] }


Less details
source code | moneroexplorer