Monero Transaction 4b6fd1ae7cdf22fd1b34b8ff459c9e0322d4f9db7daadf3a0827c6c27239ef56

Autorefresh is OFF

Tx hash: 4b6fd1ae7cdf22fd1b34b8ff459c9e0322d4f9db7daadf3a0827c6c27239ef56

Tx prefix hash: 6da9d16cb6cb10351fc73ac07e1dc0d99461f64d519636408144a23630259fa8
Tx public key: e688cd7109a6335031a4be5415838f81dca904da2104ccf8349f7bd539d694b7
Payment id: 5d33a387ed3e0c57076f4951e246139643083ab2937f455b0f7cf9303a2ca49e

Transaction 4b6fd1ae7cdf22fd1b34b8ff459c9e0322d4f9db7daadf3a0827c6c27239ef56 was carried out on the Monero network on 2014-07-08 07:06:53. The transaction has 3161605 confirmations. Total output fee is 0.007000000000 XMR.

Timestamp: 1404803213 Timestamp [UTC]: 2014-07-08 07:06:53 Age [y:d:h:m:s]: 10:131:22:47:24
Block: 119366 Fee (per_kB): 0.007000000000 (0.012169779287) Tx size: 0.5752 kB
Tx version: 1 No of confirmations: 3161605 RingCT/type: no
Extra: 0221005d33a387ed3e0c57076f4951e246139643083ab2937f455b0f7cf9303a2ca49e01e688cd7109a6335031a4be5415838f81dca904da2104ccf8349f7bd539d694b7

5 output(s) for total of 8.040000000000 xmr

stealth address amount amount idx tag
00: c275dce00ddd6d526d7d6619cec077dd54729935ea5c0292c4cc8022ba608cc9 0.040000000000 118564 of 294095 -
01: be85aadf5d480bb7b241c3d376041341e69e4d221aa0bdb6e3b91d170ea245aa 0.400000000000 72212 of 688584 -
02: 8597c820bbf5aaa328d7ae456d3ffb6a113858e93f44459100c0db03c1e252de 0.600000000000 64456 of 650760 -
03: fd24287a743de916c17555b4e664e13391a7aec612e2062bbdca1b6e19358df3 1.000000000000 83325 of 874629 -
04: bd813131afe7f1bedfe8f2433fd526637f4d10ba693f5a531e7db316d8bc8663 6.000000000000 67845 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-05 20:47:31 till 2014-07-08 04:29:10; resolution: 0.01 days)

  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________*_________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|

3 inputs(s) for total of 8.047000000000 xmr

key image 00: d2666db6e7cf3286cb48e0fcf15d401348826fdb05fe5ec0cd3f0b3f98e6c05e amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 106313fe1211c822f5da24be1f3b9ea31a954264bf4a718cd654eb85cf2116c7 00116007 1 4/9 2014-07-05 21:47:31 10:134:08:06:46
key image 01: cf7be5b7fae5bfc25db0ab197ddae55ec21ee8485f95e62246bac6ee2e4f5fca amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1d9aaabd0ee4319e2840f60d49dc07d86cc633b2afc74d4c92071cff9f2f8de3 00118587 1 2/8 2014-07-07 17:27:23 10:132:12:26:54
key image 02: 3800011c04026a77c7ad501c8be457080c4b0907106d54a62b3a1387c32da9db amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4f3cc51fd80d571e483425bf19853499d2fda91ebce60aa815c7511d583c7403 00119148 1 5/9 2014-07-08 03:29:10 10:132:02:25:07
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000000, "key_offsets": [ 117750 ], "k_image": "d2666db6e7cf3286cb48e0fcf15d401348826fdb05fe5ec0cd3f0b3f98e6c05e" } }, { "key": { "amount": 7000000000, "key_offsets": [ 160064 ], "k_image": "cf7be5b7fae5bfc25db0ab197ddae55ec21ee8485f95e62246bac6ee2e4f5fca" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 8003 ], "k_image": "3800011c04026a77c7ad501c8be457080c4b0907106d54a62b3a1387c32da9db" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "c275dce00ddd6d526d7d6619cec077dd54729935ea5c0292c4cc8022ba608cc9" } }, { "amount": 400000000000, "target": { "key": "be85aadf5d480bb7b241c3d376041341e69e4d221aa0bdb6e3b91d170ea245aa" } }, { "amount": 600000000000, "target": { "key": "8597c820bbf5aaa328d7ae456d3ffb6a113858e93f44459100c0db03c1e252de" } }, { "amount": 1000000000000, "target": { "key": "fd24287a743de916c17555b4e664e13391a7aec612e2062bbdca1b6e19358df3" } }, { "amount": 6000000000000, "target": { "key": "bd813131afe7f1bedfe8f2433fd526637f4d10ba693f5a531e7db316d8bc8663" } } ], "extra": [ 2, 33, 0, 93, 51, 163, 135, 237, 62, 12, 87, 7, 111, 73, 81, 226, 70, 19, 150, 67, 8, 58, 178, 147, 127, 69, 91, 15, 124, 249, 48, 58, 44, 164, 158, 1, 230, 136, 205, 113, 9, 166, 51, 80, 49, 164, 190, 84, 21, 131, 143, 129, 220, 169, 4, 218, 33, 4, 204, 248, 52, 159, 123, 213, 57, 214, 148, 183 ], "signatures": [ "344330590458ee0b6642f53378aae0f069523852622ca20ebeb1611d8eea5e060d0feb876207827ed4ae30d9a4b34ccd4d3de1e17c8cdf17f93f6911f6560909", "99988589139e6f5b4a05f7700785c5eda7415ee3b23dfb441acae81bc09a8909cad159fd58fb8565fab43881642b1d9cec92264ea1dd47737b5715de3525a703", "0e8890d80bfcbd044ed6f312e9a0e091310cff2185a1da69ed0e3abd22617604a8a0501a8a99ff300ffe5e73e7780daea2ed8d8c191c04f77f081748e51ad401"] }


Less details
source code | moneroexplorer