Monero Transaction 61670c3bf67bb30e946a08c3fb7e27e86dc12db5b07f35ac9ae3574b5ff4a882

Autorefresh is OFF

Tx hash: 61670c3bf67bb30e946a08c3fb7e27e86dc12db5b07f35ac9ae3574b5ff4a882

Tx prefix hash: 494337c66e94a815c7c8e0386f129a98cdc840d13968c9385d96bf9593ab3a03
Tx public key: 6da0b3c21410c1fbbc481e16503264814a721cad27c2415a6b7cc7eceea18cff
Payment id: 9fc04cb58e781b8474e6805372e50e65816a99d4615bf3d0d23841fd43651a84

Transaction 61670c3bf67bb30e946a08c3fb7e27e86dc12db5b07f35ac9ae3574b5ff4a882 was carried out on the Monero network on 2016-12-08 21:09:04. The transaction has 2108199 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1481231344 Timestamp [UTC]: 2016-12-08 21:09:04 Age [y:d:h:m:s]: 08:011:05:39:16
Block: 1197140 Fee (per_kB): 0.002000000000 (0.002566416040) Tx size: 0.7793 kB
Tx version: 1 No of confirmations: 2108199 RingCT/type: no
Extra: 0221009fc04cb58e781b8474e6805372e50e65816a99d4615bf3d0d23841fd43651a84016da0b3c21410c1fbbc481e16503264814a721cad27c2415a6b7cc7eceea18cff

3 output(s) for total of 0.032000000000 xmr

stealth address amount amount idx tag
00: aaefea84e43a3b95c9df3971a21dcf3c7afd9edab2deaf6941c262c1507679db 0.001000000000 83909 of 100400 -
01: f91ff1d192aaabfe6280048382415b9e7991bc2fb81adad09a51eeb8f29794ab 0.001000000000 83910 of 100400 -
02: 0f39c6609515ca029f34165403be6994a62174d49de990c5411b78bddba2dd16 0.030000000000 307410 of 324336 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-26 13:08:57 till 2016-12-06 23:24:53; resolution: 5.44 days)

  • |_*___*_____________*_____________________________________________________________________________________________________________________________________________________*|
  • |__**_____________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.034000000000 xmr

key image 00: f99619aac9aded74b26bb6b9da6e8a3e5820a7c083c2bf28638eb4e001e506a6 amount: 0.004000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cd521ab178fc89e375dc4617030196836785699cd0ef9ef80e8834ad49e57ecc 00057439 1 28/206 2014-05-26 14:08:57 10:208:12:39:23
- 01: f0235fbd65577ef20bf2714f0b34e0847797f6f88a5ba83c0cc19ff8fa95962d 00092981 1 12/6 2014-06-20 01:16:02 10:184:01:32:18
- 02: 0721083ddac608a199dbf6a17e6a5d5cd02b3f17a8eefbe6d7980bb686a7155b 00201883 3 9/74 2014-09-03 14:44:42 10:108:12:03:38
- 03: eabec435855631272ccdac62b2abc7623b195d5ebe951ea695273f89cfddbadf 01195713 3 2/24 2016-12-06 22:24:53 08:013:04:23:27
key image 01: f6875a7bf858f0257bbc697048e1b711bd3a2af81e720e90b49f824ac23d0494 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e0acb937530b83c24d13796459dc5c30200047264be7d7c32c84ac3f8810bbec 00070407 1 4/108 2014-06-04 12:34:29 10:199:14:13:51
- 01: 74cc7f3154538934074874546d93c6b5e6ce0dd8bd17fad1e81f797dcb3fd4fe 00076454 1 3/81 2014-06-08 17:36:38 10:195:09:11:42
- 02: 2812437c31294b0245d838ce3c332e4f1beabbd5f483e7651700ed6cb66a92eb 00076551 1 4/101 2014-06-08 19:24:57 10:195:07:23:23
- 03: 3d799fb1b989bc04516cdfd5f8c16ca1efcb573f3e398e4697eca25959b4309d 01195713 3 2/24 2016-12-06 22:24:53 08:013:04:23:27
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000, "key_offsets": [ 19790, 13197, 987, 37761 ], "k_image": "f99619aac9aded74b26bb6b9da6e8a3e5820a7c083c2bf28638eb4e001e506a6" } }, { "key": { "amount": 30000000000, "key_offsets": [ 36873, 20139, 424, 249268 ], "k_image": "f6875a7bf858f0257bbc697048e1b711bd3a2af81e720e90b49f824ac23d0494" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "aaefea84e43a3b95c9df3971a21dcf3c7afd9edab2deaf6941c262c1507679db" } }, { "amount": 1000000000, "target": { "key": "f91ff1d192aaabfe6280048382415b9e7991bc2fb81adad09a51eeb8f29794ab" } }, { "amount": 30000000000, "target": { "key": "0f39c6609515ca029f34165403be6994a62174d49de990c5411b78bddba2dd16" } } ], "extra": [ 2, 33, 0, 159, 192, 76, 181, 142, 120, 27, 132, 116, 230, 128, 83, 114, 229, 14, 101, 129, 106, 153, 212, 97, 91, 243, 208, 210, 56, 65, 253, 67, 101, 26, 132, 1, 109, 160, 179, 194, 20, 16, 193, 251, 188, 72, 30, 22, 80, 50, 100, 129, 74, 114, 28, 173, 39, 194, 65, 90, 107, 124, 199, 236, 238, 161, 140, 255 ], "signatures": [ "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", "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"] }


Less details
source code | moneroexplorer