Monero Transaction 64f229e03038565824f356c6c158a7a638052e25c14e2dcfcaa4745f6060d12f

Autorefresh is OFF

Tx hash: 64f229e03038565824f356c6c158a7a638052e25c14e2dcfcaa4745f6060d12f

Tx prefix hash: ccb90f40f426aa6858a49a0e186bf4e26ecbde766f498be5653d1dbe446dba23
Tx public key: 0072f01c14d804c4f46778e0c0a4e54565083ad9852284eef7a37c31d3eedc89
Payment id: 1291e499f3ced3ce81ec178ed509e7aff638a398571c47e4efd1f993f9974158

Transaction 64f229e03038565824f356c6c158a7a638052e25c14e2dcfcaa4745f6060d12f was carried out on the Monero network on 2014-08-04 10:54:49. The transaction has 3123160 confirmations. Total output fee is 0.009460399079 XMR.

Timestamp: 1407149689 Timestamp [UTC]: 2014-08-04 10:54:49 Age [y:d:h:m:s]: 10:105:19:39:47
Block: 158568 Fee (per_kB): 0.009460399079 (0.012124466404) Tx size: 0.7803 kB
Tx version: 1 No of confirmations: 3123160 RingCT/type: no
Extra: 0221001291e499f3ced3ce81ec178ed509e7aff638a398571c47e4efd1f993f9974158010072f01c14d804c4f46778e0c0a4e54565083ad9852284eef7a37c31d3eedc89

5 output(s) for total of 1.179539600921 xmr

stealth address amount amount idx tag
00: 1f284bd0b2825dc792a04249ff643c03af002eb9caf5a65ca44054445bebd196 0.000539600921 0 of 1 -
01: 78f59af311572cd04280e43fe0a134759876f59c9cc23897a70e41af2289ba30 0.009000000000 157070 of 233398 -
02: e06f05ca34b4209e68e19bc574eed0ba6157b23d32f29865eeeedea3c376fb96 0.070000000000 91778 of 263947 -
03: 02fc8acc55a9330392cb7aae6a0b656f5e7282ed0b27fddaef774e5a097cefb7 0.100000000000 369532 of 982315 -
04: 6e9d0a69f9f6ebb81fddd3311b0b0f76fb4d62d32d76da9719411f57250827f8 1.000000000000 164670 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-03 09:18:08 till 2014-08-04 09:19:03; resolution: 0.01 days)

  • |__________________________________*_______________________________________________________________________________________________________________________________________|
  • |____________________________________*_____________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |____________________________________*_____________________________________________________________________________________________________________________________________|
  • |________*_________________________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 1.189000000000 xmr

key image 00: 36163c2afe689674c9877644f8922ea0bffd1eba80eecf6b8d67202d6e803ed2 amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 292f378e030c60fb3b2604c608f57c46bb923cccafda324d47532b298a4541e7 00157326 1 1/6 2014-08-03 14:07:26 10:106:16:27:10
key image 01: bfbcf47dc913d6e46ef5c860eb46613c4783e477af298d3525de1193707e6415 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2ff0352f9983b556c98f0ea091080b610cb91876e559ed45988932fe07af59b3 00157341 1 2/6 2014-08-03 14:21:30 10:106:16:13:06
key image 02: a24ce87ecd9ec8f47cdeffa1faaba5f7c0e457839ee25c6b7320a4675d45a3a0 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e097d1c032421e6671f536499a6a5fffb5cd8935f49cf428c1ef71237a20a610 00158421 1 6/9 2014-08-04 08:19:03 10:105:22:15:33
key image 03: 19fe6f56d3a8eb3dc8d92d64cc30b0b60b5d764a1dd5054b7fc31282ac7f5803 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d7aa2ec9a1538b8c8cf2b3ef31ef468d3ee4a33f864158e72f3c4ebc13244cf0 00157341 1 1/4 2014-08-03 14:21:30 10:106:16:13:06
key image 04: fbfa002ae91c2f8ae79c0c194039c93909795ce6b2665575962997458b27fc42 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 959ade76e25b494ea4fae59a7dd56a4dbb558d29ab70b2608414432dad352686 00157077 1 1/5 2014-08-03 10:18:08 10:106:20:16:28
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000, "key_offsets": [ 156663 ], "k_image": "36163c2afe689674c9877644f8922ea0bffd1eba80eecf6b8d67202d6e803ed2" } }, { "key": { "amount": 30000000000, "key_offsets": [ 156817 ], "k_image": "bfbcf47dc913d6e46ef5c860eb46613c4783e477af298d3525de1193707e6415" } }, { "key": { "amount": 50000000000, "key_offsets": [ 113635 ], "k_image": "a24ce87ecd9ec8f47cdeffa1faaba5f7c0e457839ee25c6b7320a4675d45a3a0" } }, { "key": { "amount": 700000000000, "key_offsets": [ 94160 ], "k_image": "19fe6f56d3a8eb3dc8d92d64cc30b0b60b5d764a1dd5054b7fc31282ac7f5803" } }, { "key": { "amount": 400000000000, "key_offsets": [ 130669 ], "k_image": "fbfa002ae91c2f8ae79c0c194039c93909795ce6b2665575962997458b27fc42" } } ], "vout": [ { "amount": 539600921, "target": { "key": "1f284bd0b2825dc792a04249ff643c03af002eb9caf5a65ca44054445bebd196" } }, { "amount": 9000000000, "target": { "key": "78f59af311572cd04280e43fe0a134759876f59c9cc23897a70e41af2289ba30" } }, { "amount": 70000000000, "target": { "key": "e06f05ca34b4209e68e19bc574eed0ba6157b23d32f29865eeeedea3c376fb96" } }, { "amount": 100000000000, "target": { "key": "02fc8acc55a9330392cb7aae6a0b656f5e7282ed0b27fddaef774e5a097cefb7" } }, { "amount": 1000000000000, "target": { "key": "6e9d0a69f9f6ebb81fddd3311b0b0f76fb4d62d32d76da9719411f57250827f8" } } ], "extra": [ 2, 33, 0, 18, 145, 228, 153, 243, 206, 211, 206, 129, 236, 23, 142, 213, 9, 231, 175, 246, 56, 163, 152, 87, 28, 71, 228, 239, 209, 249, 147, 249, 151, 65, 88, 1, 0, 114, 240, 28, 20, 216, 4, 196, 244, 103, 120, 224, 192, 164, 229, 69, 101, 8, 58, 217, 133, 34, 132, 238, 247, 163, 124, 49, 211, 238, 220, 137 ], "signatures": [ "ff8185a5a6791482248592846bcbdc9e6ccb9442cbdd43cb1bb668bb8eb9ad02fb20143eb7a24a4d57ab94473b2226ec7a68f824c1441a9c661c7dc95086fa0b", "7b5b3a8acaef6273f5b962c2525f339a769840a3104fae05e83bdca109cd4303f54413392b29b0e7c910923a0fde00599458d6434897144877df7bf76205d703", "a08511ab037bea2d30ded286ecf55a3dfad57f9d6f0ce0e5f05ac2dd0801150b929953397d45e447934a677e443fee4350fa9c40bf1194796dd9c065733fdb02", "75d09da1c8bcda3929a42a9e1682f4e84eb15f8d91ab3ab6c1c3c877f8a50e045c2175a5176e6ed5eea4eb5a4fea44e74ee8e0fbf51f245a8226b37483a82800", "d564f7540cc5760e405236fe50ebd640d830732bbc36b25aecc186da6744960809f2bc00d301a7cb3d47cc3fda4aacc26ed2f8c58440daa831327034da4c1e00"] }


Less details
source code | moneroexplorer