Monero Transaction 643a138454316a8cada651bf7f0a5ed867fa4147dc50284788296ea2bc4978f1

Autorefresh is OFF

Tx hash: 643a138454316a8cada651bf7f0a5ed867fa4147dc50284788296ea2bc4978f1

Tx prefix hash: 2beedc4ed756d53ba76217b7a8fea5eceddcd06bea73ddd47ef8232eee2f7a53
Tx public key: 11e5d959aae390db8d466d42cc6ce07fa4ab8c0d5129ca1d59a6c492fb7b4dae
Payment id: cfbceb09619f4df80296d06a7213a1a8b2604d62b2c418ae3881dd5edd08634d

Transaction 643a138454316a8cada651bf7f0a5ed867fa4147dc50284788296ea2bc4978f1 was carried out on the Monero network on 2014-06-04 20:52:59. The transaction has 3220959 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1401915179 Timestamp [UTC]: 2014-06-04 20:52:59 Age [y:d:h:m:s]: 10:180:12:24:48
Block: 70957 Fee (per_kB): 0.000001000000 (0.000001230769) Tx size: 0.8125 kB
Tx version: 1 No of confirmations: 3220959 RingCT/type: no
Extra: 022100cfbceb09619f4df80296d06a7213a1a8b2604d62b2c418ae3881dd5edd08634d0111e5d959aae390db8d466d42cc6ce07fa4ab8c0d5129ca1d59a6c492fb7b4dae

6 output(s) for total of 10.510939000000 xmr

stealth address amount amount idx tag
00: abb6a6300db73619113a00898259fab66897bb11bca592344710054370bfc3ac 0.000009000000 15605 of 46395 -
01: 67d514eb96d3271abba851830d769a741e2c12e7561082759064ff3646d6653c 0.000030000000 27580 of 59484 -
02: 752371cdd0ac5a3f312a89232de93b425827635ac1a92e33abd29226404f0796 0.000900000000 28074 of 81915 -
03: e1611ad9eef07fe18c455e02150229ffbdaed99a9e6aa066dfef9d721075b76f 0.010000000000 83145 of 502466 -
04: 7afc1ac93fd47b9007a6d9fe7f3bc006b4cc42b7147a00ad1646ea263f54ddc4 0.500000000000 18407 of 1118624 -
05: 76d18e2115ca6f5e2f53648198bf27811699ddf505be9ba3c4c92536336e0a38 10.000000000000 72212 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 11:03:22 till 2014-06-04 21:34:25; resolution: 0.00 days)

  • |_________________*________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________*________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________*________________|
  • |_________________________________*________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________*_______________________________________________|

5 inputs(s) for total of 10.510940000000 xmr

key image 00: e6493cd556d94ce18c0b949a1bfaba179d6b5d3f026abea81ac53992e20ab805 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a6f31d8610a2c4a3c8f2c24fdfec3a893988b30afde94f889ab68d6932182eed 00070371 1 13/58 2014-06-04 12:03:22 10:180:21:14:25
key image 01: 5e51eab70c827557eee2ca078972c5ec44bc268e338f394313e28f928b9c49e5 amount: 0.003940000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 753280d520f360b9608e7fa3a5e28a6b8f0b2a5f90fbefda9f8a633fabe69cfa 00070667 1 23/68 2014-06-04 16:32:51 10:180:16:44:56
key image 02: e02da9beb2510e92f10e07c58e1c044662dc636546fd0741fbf34a06854013de amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4ca4d0936ee82ca62adf2deeb4e8e5c24f37a78d207892c0681153eb66681ef8 00070936 1 59/69 2014-06-04 20:34:25 10:180:12:43:22
key image 03: 529de949caa9764c5ee8ea314cbc09586c4ea697f742b3c0304d55f51e71e9a6 amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aad208e88683550609ef436af0b15d86dc17bc1b70ceb4637c9abf82acfb3c5e 00070435 1 25/64 2014-06-04 13:04:34 10:180:20:13:13
key image 04: f134127be95d38f07ce04ac93181b752bfe2016b83010c4627594f18b11fba45 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3c8ee5de7ac92b91dd2f3c83f8b34c494f2d0cbf72e8b815fc4716d5c8988ada 00070793 1 52/67 2014-06-04 18:37:28 10:180:14:40:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 10672 ], "k_image": "e6493cd556d94ce18c0b949a1bfaba179d6b5d3f026abea81ac53992e20ab805" } }, { "key": { "amount": 3940000000, "key_offsets": [ 146 ], "k_image": "5e51eab70c827557eee2ca078972c5ec44bc268e338f394313e28f928b9c49e5" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 2539 ], "k_image": "e02da9beb2510e92f10e07c58e1c044662dc636546fd0741fbf34a06854013de" } }, { "key": { "amount": 7000000000, "key_offsets": [ 41213 ], "k_image": "529de949caa9764c5ee8ea314cbc09586c4ea697f742b3c0304d55f51e71e9a6" } }, { "key": { "amount": 700000000000, "key_offsets": [ 10940 ], "k_image": "f134127be95d38f07ce04ac93181b752bfe2016b83010c4627594f18b11fba45" } } ], "vout": [ { "amount": 9000000, "target": { "key": "abb6a6300db73619113a00898259fab66897bb11bca592344710054370bfc3ac" } }, { "amount": 30000000, "target": { "key": "67d514eb96d3271abba851830d769a741e2c12e7561082759064ff3646d6653c" } }, { "amount": 900000000, "target": { "key": "752371cdd0ac5a3f312a89232de93b425827635ac1a92e33abd29226404f0796" } }, { "amount": 10000000000, "target": { "key": "e1611ad9eef07fe18c455e02150229ffbdaed99a9e6aa066dfef9d721075b76f" } }, { "amount": 500000000000, "target": { "key": "7afc1ac93fd47b9007a6d9fe7f3bc006b4cc42b7147a00ad1646ea263f54ddc4" } }, { "amount": 10000000000000, "target": { "key": "76d18e2115ca6f5e2f53648198bf27811699ddf505be9ba3c4c92536336e0a38" } } ], "extra": [ 2, 33, 0, 207, 188, 235, 9, 97, 159, 77, 248, 2, 150, 208, 106, 114, 19, 161, 168, 178, 96, 77, 98, 178, 196, 24, 174, 56, 129, 221, 94, 221, 8, 99, 77, 1, 17, 229, 217, 89, 170, 227, 144, 219, 141, 70, 109, 66, 204, 108, 224, 127, 164, 171, 140, 13, 81, 41, 202, 29, 89, 166, 196, 146, 251, 123, 77, 174 ], "signatures": [ "1f27bb81f6206e55ab68502803eeda83ffdee44cf0cd2616271806eb6a5b0c0a771fb431a7b0be1c29c773ed14937356f8ba24f3202efce71fcf472b45da5305", "ba185cddf5805e932d6e75e21a1739d96ff90c5691939579670a90f4545d010c2b578a28762e714a04e73ee26af9893aaa6ae4f3bdf7a09c0637f9a9a77a4b08", "5d8dfbd812b3a3a02b83c21c297a1ba45f6a3832426b5e190893a33b0a38bc08a2c0cff37982c196e853a356d3e66decd1b7e37fa6eedd5f6bb3d21cbc186e0c", "486c575b6c0346d5e060877666fb4c6c6996fe31976135662fdf2e3887033a04d041cfe93cfee669e9a974de629ec9876c229801a9e52623b01d47092b635a04", "6cbb3ffe88a771b25a0b16aaf5c98f4b771aa65a98d087ab02ec3bbfd04d560bb836f0fccd653cfa485c041a82268a314e5e52fcdffb87aaa0da25ab0c07920c"] }


Less details
source code | moneroexplorer