Monero Transaction 63998d3805f021cc75afb38296d121373cb33bb96c81a6ddf06e9be845a51e16

Autorefresh is OFF

Tx hash: 63998d3805f021cc75afb38296d121373cb33bb96c81a6ddf06e9be845a51e16

Tx prefix hash: ae6bd70cfac6e17449e2e34f384133626760b9db2aa0c97202a980dbcb7175a0
Tx public key: 18ff5e52a87ff01d823df27c7316727a3783e6ec2785b32d7e62763c2e9e4659
Payment id: c95e38454b68ec55be0db6936a186bb07ad4f93acf7eda18f39c3abc76c44c6a

Transaction 63998d3805f021cc75afb38296d121373cb33bb96c81a6ddf06e9be845a51e16 was carried out on the Monero network on 2014-12-13 03:03:00. The transaction has 2973739 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1418439780 Timestamp [UTC]: 2014-12-13 03:03:00 Age [y:d:h:m:s]: 10:027:01:40:27
Block: 345347 Fee (per_kB): 0.020000000000 (0.054323607427) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 2973739 RingCT/type: no
Extra: 022100c95e38454b68ec55be0db6936a186bb07ad4f93acf7eda18f39c3abc76c44c6a0118ff5e52a87ff01d823df27c7316727a3783e6ec2785b32d7e62763c2e9e4659

5 output(s) for total of 89.980000000000 xmr

stealth address amount amount idx tag
00: 52843a9da51e5f461c15aa0062f7602e40575afba37b039ae016ea44ccccddd2 0.080000000000 106243 of 269576 -
01: eb42cd6e3f65647814adf402fc1bb8b290a3e798ee38ff390b19c91cc9193219 0.900000000000 179691 of 454894 -
02: a9e508f041a686efc080f4a88d2b875da24c3329dd276123f2b4c8f0a6ef9d44 4.000000000000 136911 of 237197 -
03: 8a12325deef1b7d1ddaccb5b39b42943ffc141e972c12471f9266bb874a4d692 5.000000000000 132451 of 255089 -
04: 915dac9062808504170bfd9a25f5c65bcf5f48dab42fadbeb11b117408d32773 80.000000000000 3890 of 23982 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-12 17:58:09 till 2014-12-12 19:58:09; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 90.000000000000 xmr

key image 00: c610d0e6417d41deafdebd4b8f935ca2792366461d3f2fa1f535d0141b73015f amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 239eb370b5e6415ce2f61a0d855d504e8eaa42d33a3c1a1e4aeadf45ce1a3ee5 00344953 1 2/6 2014-12-12 18:58:09 10:027:09:45:18
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000000, "key_offsets": [ 6958 ], "k_image": "c610d0e6417d41deafdebd4b8f935ca2792366461d3f2fa1f535d0141b73015f" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "52843a9da51e5f461c15aa0062f7602e40575afba37b039ae016ea44ccccddd2" } }, { "amount": 900000000000, "target": { "key": "eb42cd6e3f65647814adf402fc1bb8b290a3e798ee38ff390b19c91cc9193219" } }, { "amount": 4000000000000, "target": { "key": "a9e508f041a686efc080f4a88d2b875da24c3329dd276123f2b4c8f0a6ef9d44" } }, { "amount": 5000000000000, "target": { "key": "8a12325deef1b7d1ddaccb5b39b42943ffc141e972c12471f9266bb874a4d692" } }, { "amount": 80000000000000, "target": { "key": "915dac9062808504170bfd9a25f5c65bcf5f48dab42fadbeb11b117408d32773" } } ], "extra": [ 2, 33, 0, 201, 94, 56, 69, 75, 104, 236, 85, 190, 13, 182, 147, 106, 24, 107, 176, 122, 212, 249, 58, 207, 126, 218, 24, 243, 156, 58, 188, 118, 196, 76, 106, 1, 24, 255, 94, 82, 168, 127, 240, 29, 130, 61, 242, 124, 115, 22, 114, 122, 55, 131, 230, 236, 39, 133, 179, 45, 126, 98, 118, 60, 46, 158, 70, 89 ], "signatures": [ "513c128c4868227590e78fbe2e068eed2d09ef788a85e3114c753365e73b15028a90f74c6cf70694c0bb199c768b1120220ad41258bf80ea3870ed1e90cf2201"] }


Less details
source code | moneroexplorer