Monero Transaction 604dea65b42780a6262d27909315544328d84e1be787e2085b1dea14ced3c25c

Autorefresh is OFF

Tx hash: 604dea65b42780a6262d27909315544328d84e1be787e2085b1dea14ced3c25c

Tx prefix hash: 93078c139f151661888fdd90f5ccfac1289a43a0ff9b3cddb079dcb248ee5fe1
Tx public key: a63ba8898cd1c3f0a989176b27430bd14bdf5222fa249ca78c598f7df17c4ecf
Payment id: f131cdb5246a481fb8026d6228cf1e0e217f599e9928459cbde582734cf96dc8

Transaction 604dea65b42780a6262d27909315544328d84e1be787e2085b1dea14ced3c25c was carried out on the Monero network on 2014-07-06 03:13:16. The transaction has 3161856 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404616396 Timestamp [UTC]: 2014-07-06 03:13:16 Age [y:d:h:m:s]: 10:130:04:37:09
Block: 116326 Fee (per_kB): 0.010000000000 (0.015562310030) Tx size: 0.6426 kB
Tx version: 1 No of confirmations: 3161856 RingCT/type: no
Extra: 022100f131cdb5246a481fb8026d6228cf1e0e217f599e9928459cbde582734cf96dc801a63ba8898cd1c3f0a989176b27430bd14bdf5222fa249ca78c598f7df17c4ecf

4 output(s) for total of 6.730000000000 xmr

stealth address amount amount idx tag
00: 48994c8568a69cc37162cb9c47674aec28c0a3899c713a4cf9f7e05a4bce9aad 0.040000000000 117777 of 294095 -
01: 168c3f4dce14f193c3bf2c42d277f22b7c26fb146fc309f31f7bf284608cd512 0.090000000000 74995 of 317822 -
02: 10735ca436541ab7b8db9a480b65b57f8b93d35ee438809dd826310db643ede9 0.600000000000 58923 of 650760 -
03: 8cef6702ecabedbb26f22c0f907068ffa01fad274a97bd957aa6f0b98ee640fe 6.000000000000 67457 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-05 16:04:26 till 2014-07-05 19:08:13; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

4 inputs(s) for total of 6.740000000000 xmr

key image 00: 0abd5fa2a591a685ee446e761304e9c241af2a4e4469ffd560f508b396d7cba4 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cffdafed552829731d4bd1f5b8db702b99f43517ac89edbe13cbaae57f285c51 00115714 1 24/69 2014-07-05 17:04:26 10:130:14:45:59
key image 01: d6b03b39e2a91ac49772a64f24ec4f81d31dac8398988cfa438b340184fee8bb amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fd1f31a7ca40ef892ed251b0f82155cd825662e0d920d3121a304157e9bef3c0 00115714 1 24/69 2014-07-05 17:04:26 10:130:14:45:59
key image 02: 5016ab93da945a22e9d1718596952b21ce0c91f7e83cc27aafe606a8484589f1 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dfe5d1b157880a978d4e9631cdcb4162541d1ea428600ea1288ed200b68008c4 00115714 1 34/5 2014-07-05 17:04:26 10:130:14:45:59
key image 03: 6b19d0f9305ab2f0c16f2e4e1aee9fabbed6130a2a6fbebbfd5cfbac59cba857 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a94f25a7de4aaff5f9419a6d750e6a8c3e3f265aec892d2cdfaf42bfe80d76c4 00115786 1 35/71 2014-07-05 18:08:13 10:130:13:42:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 46910 ], "k_image": "0abd5fa2a591a685ee446e761304e9c241af2a4e4469ffd560f508b396d7cba4" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 21726 ], "k_image": "d6b03b39e2a91ac49772a64f24ec4f81d31dac8398988cfa438b340184fee8bb" } }, { "key": { "amount": 40000000000, "key_offsets": [ 117729 ], "k_image": "5016ab93da945a22e9d1718596952b21ce0c91f7e83cc27aafe606a8484589f1" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 21777 ], "k_image": "6b19d0f9305ab2f0c16f2e4e1aee9fabbed6130a2a6fbebbfd5cfbac59cba857" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "48994c8568a69cc37162cb9c47674aec28c0a3899c713a4cf9f7e05a4bce9aad" } }, { "amount": 90000000000, "target": { "key": "168c3f4dce14f193c3bf2c42d277f22b7c26fb146fc309f31f7bf284608cd512" } }, { "amount": 600000000000, "target": { "key": "10735ca436541ab7b8db9a480b65b57f8b93d35ee438809dd826310db643ede9" } }, { "amount": 6000000000000, "target": { "key": "8cef6702ecabedbb26f22c0f907068ffa01fad274a97bd957aa6f0b98ee640fe" } } ], "extra": [ 2, 33, 0, 241, 49, 205, 181, 36, 106, 72, 31, 184, 2, 109, 98, 40, 207, 30, 14, 33, 127, 89, 158, 153, 40, 69, 156, 189, 229, 130, 115, 76, 249, 109, 200, 1, 166, 59, 168, 137, 140, 209, 195, 240, 169, 137, 23, 107, 39, 67, 11, 209, 75, 223, 82, 34, 250, 36, 156, 167, 140, 89, 143, 125, 241, 124, 78, 207 ], "signatures": [ "7156ac759acaa4387198aba4a99e742ed24103ac432d87b722cb84adf7634f04c9c683346937c624136870bbecf70a9b303dbe8371d7171c19439f11e8ec9902", "1571a2a0c446747e309d7658a2bac610562b900e5f13a4f8dbf3b591699546087a37b60a89f19acd1d04d868327232ce58f2769bf586c108d73113f5e1c51d05", "a68e79522be370d57ec3c1845e0475bb043645bb79e07baa0b0707dd365deb049a4d1f26750e0cc18ff160aef7b0f93d907bde7995a5f3f81036e6200d1cdd08", "546b19038b82a22120091229f8438c4d4f9a03454c2c9521a70f6d90720e3b0e878c106f58f7a36268718d91c7ac07fecbf35c89a22134ee8fec8d6f3be17308"] }


Less details
source code | moneroexplorer