Monero Transaction 64bab9dba65fb0aee8a0b97b21b814d486ed9005dd8c9c9bef5e3bb9e3c87708

Autorefresh is OFF

Tx hash: 64bab9dba65fb0aee8a0b97b21b814d486ed9005dd8c9c9bef5e3bb9e3c87708

Tx prefix hash: 407363d8de08d127507a1084accb0aadc91347b9791ed4be5502d49a184b6fcb
Tx public key: 6e6911ad955d2601c8e2a3371a6044b610297aa05a4e68f9d2833976a9e73071
Payment id: a4e62ff5c2c84420ffc3196538426a72ef008ce6b0d1709566cc5fe726cd92c5

Transaction 64bab9dba65fb0aee8a0b97b21b814d486ed9005dd8c9c9bef5e3bb9e3c87708 was carried out on the Monero network on 2016-01-20 18:41:14. The transaction has 2375114 confirmations. Total output fee is 0.125500000000 XMR.

Timestamp: 1453315274 Timestamp [UTC]: 2016-01-20 18:41:14 Age [y:d:h:m:s]: 08:321:07:32:04
Block: 920879 Fee (per_kB): 0.125500000000 (0.191523099851) Tx size: 0.6553 kB
Tx version: 1 No of confirmations: 2375114 RingCT/type: no
Extra: 022100a4e62ff5c2c84420ffc3196538426a72ef008ce6b0d1709566cc5fe726cd92c5016e6911ad955d2601c8e2a3371a6044b610297aa05a4e68f9d2833976a9e73071

7 output(s) for total of 98.874500000000 xmr

stealth address amount amount idx tag
00: 418eadd9116eef07eb620580991efb6ad303145b6cfda06a6f9890b0e1e020ef 0.074500000000 0 of 4 -
01: 29a486b4b33dff7738df02baa822fa026915eef4420bb4598b50126f267be37f 0.200000000000 1060006 of 1272210 -
02: d48ed054ba3d6cab2dcf4d49c7fb45dc1367e8b05f12e8af93cb6def25b2570a 0.600000000000 542340 of 650760 -
03: 4abfe324fa1d4d057e8291a333a25e1dbf31f637324ab69f2e9ac5dad1e2e29a 3.000000000000 225412 of 300495 -
04: 129dd34b3cf7d93abefefdf15ac7e36901bc0cc06a68370d7e131acb906d45ef 5.000000000000 197870 of 255089 -
05: 4a5534c5322c9292676f2b747098c042700ceaf8672fc339b5706aa98bf83704 10.000000000000 705831 of 921411 -
06: 97fcfc1ff297bd30a5e25706c136a81e85759e6bfbabc741128cb4391a4f739e 80.000000000000 11046 of 23982 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-04-15 09:02:51 till 2016-01-12 19:33:42; resolution: 1.60 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________*__________________________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 99.000000000000 xmr

key image 00: cad28adba9532b6f5c805a2ccb107744b52666aecb036fecbc0e2a04ad9df245 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3a79b54f3c02f3b3d0829bc060f00ce4c1d7dad2d99c994d187864685905446 00909660 1 1/6 2016-01-12 18:33:42 08:329:07:39:36
key image 01: 646a6f83e0bb173c5ffe615477c7e3aa2cf044b5cde62f73c68cb23fa7c28216 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 26cd3e65f0d8b7c798ef54a25ff44fb6f9aa7ddf4987fd6374e24b32165943a0 00683145 1 15/6 2015-08-06 09:03:25 09:123:17:09:53
key image 02: 2bf1ac6aeb6ced2b06dd8d7b382d26f1376cd8239c5e7eb0c0e06469c706e597 amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61681aabff9bd9fea65da813e7ccb6110c070fb747424c37f8f907db17123c42 00521717 1 9/3 2015-04-15 10:02:51 09:236:16:10:27
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6000000000000, "key_offsets": [ 127711 ], "k_image": "cad28adba9532b6f5c805a2ccb107744b52666aecb036fecbc0e2a04ad9df245" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 204141 ], "k_image": "646a6f83e0bb173c5ffe615477c7e3aa2cf044b5cde62f73c68cb23fa7c28216" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 9930 ], "k_image": "2bf1ac6aeb6ced2b06dd8d7b382d26f1376cd8239c5e7eb0c0e06469c706e597" } } ], "vout": [ { "amount": 74500000000, "target": { "key": "418eadd9116eef07eb620580991efb6ad303145b6cfda06a6f9890b0e1e020ef" } }, { "amount": 200000000000, "target": { "key": "29a486b4b33dff7738df02baa822fa026915eef4420bb4598b50126f267be37f" } }, { "amount": 600000000000, "target": { "key": "d48ed054ba3d6cab2dcf4d49c7fb45dc1367e8b05f12e8af93cb6def25b2570a" } }, { "amount": 3000000000000, "target": { "key": "4abfe324fa1d4d057e8291a333a25e1dbf31f637324ab69f2e9ac5dad1e2e29a" } }, { "amount": 5000000000000, "target": { "key": "129dd34b3cf7d93abefefdf15ac7e36901bc0cc06a68370d7e131acb906d45ef" } }, { "amount": 10000000000000, "target": { "key": "4a5534c5322c9292676f2b747098c042700ceaf8672fc339b5706aa98bf83704" } }, { "amount": 80000000000000, "target": { "key": "97fcfc1ff297bd30a5e25706c136a81e85759e6bfbabc741128cb4391a4f739e" } } ], "extra": [ 2, 33, 0, 164, 230, 47, 245, 194, 200, 68, 32, 255, 195, 25, 101, 56, 66, 106, 114, 239, 0, 140, 230, 176, 209, 112, 149, 102, 204, 95, 231, 38, 205, 146, 197, 1, 110, 105, 17, 173, 149, 93, 38, 1, 200, 226, 163, 55, 26, 96, 68, 182, 16, 41, 122, 160, 90, 78, 104, 249, 210, 131, 57, 118, 169, 231, 48, 113 ], "signatures": [ "320a48feca211418cef2d2d4dd89f110a4604eaa9b9bbde64a1dd5c3149e1704c3c04c502fb4ed7c3ff23c732b5047bcd366295f7bf8b67ad25467c023ab1c03", "48de2309fad9e70d793a57e862b503a45dec4d61e40cbab45c0bfdb938b5ff0d0f9976729d6f45ba9a33523ac686389c96ab339d069e618fe8f6274e7f6efb08", "3aba0928fea0c052ebfbfc9e41f261ef35f4422133f8ab12e6082325c310f60f4000cb3107c51b636c59b1f99c848e4cfe637c858aca907b205830edfd1a2109"] }


Less details
source code | moneroexplorer