Monero Transaction 666b65fda5f67ed1d3d0be601def113752674ea32ef1b07fd5f3f70f18e50ce4

Autorefresh is OFF

Tx hash: 666b65fda5f67ed1d3d0be601def113752674ea32ef1b07fd5f3f70f18e50ce4

Tx prefix hash: be0d209c886ecf9b066f33bb31abcaf74f5610db63af75e59fbd99a832fab7f8
Tx public key: b4370614e5db57a97f66c27e144a3fcc9b369c618dfdaec64de6724f858f2666

Transaction 666b65fda5f67ed1d3d0be601def113752674ea32ef1b07fd5f3f70f18e50ce4 was carried out on the Monero network on 2014-06-22 23:05:09. The transaction has 3190738 confirmations. Total output fee is 0.016295510689 XMR.

Timestamp: 1403478309 Timestamp [UTC]: 2014-06-22 23:05:09 Age [y:d:h:m:s]: 10:157:02:20:05
Block: 97328 Fee (per_kB): 0.016295510689 (0.019841382813) Tx size: 0.8213 kB
Tx version: 1 No of confirmations: 3190738 RingCT/type: no
Extra: 01b4370614e5db57a97f66c27e144a3fcc9b369c618dfdaec64de6724f858f2666

7 output(s) for total of 8.954614770000 xmr

stealth address amount amount idx tag
00: 02f7079455c257d3d4f88773451f97c72f8024ce6f7a344a054f9e8445a723a1 0.004614770000 0 of 1 -
01: 25b38bf335a4484b56137af74aa36f9cc5b2b9384b02d7acdfa762e69f762095 0.060000000000 83981 of 264760 -
02: f1974776f413c4760ea857bf9767623dc7a1eee5edfd96b1665e6f62ff836411 0.090000000000 65043 of 317822 -
03: 4ca8fabced6577433872d91ec9846feac7270fde1125b01bed880e0c9d30455a 0.400000000000 43388 of 688584 -
04: 37340353b4bde54291374a486f62ea0935c9778f4b6d362bc8a25a7dad00d4fd 0.400000000000 43389 of 688584 -
05: d38283609d4c580112eef9de9e1f07a06846af5eaa99d43101f44d5674cf9fec 3.000000000000 14460 of 300495 -
06: 19a162700600ad4658fd1ee75828672b8e1deafec740fe43f38960026c6adb5c 5.000000000000 17954 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-02 20:51:59 till 2014-06-21 15:38:16; resolution: 0.11 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |____________________________________*_____________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________*________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 8.970910280689 xmr

key image 00: 64ef27694a889e5804dc096bbe3f3a1ba3ac8ec0d4dd7a9086f6a57c2f2c87ec amount: 0.000910280689
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 816785ae93db3f5a86a19d72d87d6c3dfc225953d92b3970108185770ff18c58 00095343 1 10/146 2014-06-21 14:38:16 10:158:10:46:58
key image 01: 5807b0afc230f89703dd56852b0e88b0feeb5866ae8dcb6a181bdddce834551c amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 24255322c786a81310f4356cc5afefc71f7b7a03a5a11f1ee92ffeed98e6cb8f 00094384 1 30/3 2014-06-21 00:24:19 10:159:01:00:55
key image 02: 81c13b7a24bc2860e44b16939f624a445461292eacc56f42972d0a5e24a6e5c3 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a54a0100559f4b816153e02de69f4f0e7d7717c4cfb665f316580c39de76c5fe 00073748 1 83/7 2014-06-06 19:45:49 10:173:05:39:25
key image 03: 8e00283456480b290a852c1bbede2195343120398284f51bef2241c94bec4fe3 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e428049a84814fa926bced8724fbc9813bc229bf12da1bb90ab7b3575eb6307c 00082222 1 11/114 2014-06-12 16:35:05 10:167:08:50:09
key image 04: 93380cc0a501f1905d48ce27f35531a198838f46a7fac85e926082b803110926 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4da6b075e72d0ff735c3806f1cfbaf9b5c88b6718d4d64f90203396e0c3b8ce0 00068067 1 7/4 2014-06-02 21:51:59 10:177:03:33:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 910280689, "key_offsets": [ 0 ], "k_image": "64ef27694a889e5804dc096bbe3f3a1ba3ac8ec0d4dd7a9086f6a57c2f2c87ec" } }, { "key": { "amount": 50000000000, "key_offsets": [ 90508 ], "k_image": "5807b0afc230f89703dd56852b0e88b0feeb5866ae8dcb6a181bdddce834551c" } }, { "key": { "amount": 900000000000, "key_offsets": [ 12471 ], "k_image": "81c13b7a24bc2860e44b16939f624a445461292eacc56f42972d0a5e24a6e5c3" } }, { "key": { "amount": 20000000000, "key_offsets": [ 108785 ], "k_image": "8e00283456480b290a852c1bbede2195343120398284f51bef2241c94bec4fe3" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 1546 ], "k_image": "93380cc0a501f1905d48ce27f35531a198838f46a7fac85e926082b803110926" } } ], "vout": [ { "amount": 4614770000, "target": { "key": "02f7079455c257d3d4f88773451f97c72f8024ce6f7a344a054f9e8445a723a1" } }, { "amount": 60000000000, "target": { "key": "25b38bf335a4484b56137af74aa36f9cc5b2b9384b02d7acdfa762e69f762095" } }, { "amount": 90000000000, "target": { "key": "f1974776f413c4760ea857bf9767623dc7a1eee5edfd96b1665e6f62ff836411" } }, { "amount": 400000000000, "target": { "key": "4ca8fabced6577433872d91ec9846feac7270fde1125b01bed880e0c9d30455a" } }, { "amount": 400000000000, "target": { "key": "37340353b4bde54291374a486f62ea0935c9778f4b6d362bc8a25a7dad00d4fd" } }, { "amount": 3000000000000, "target": { "key": "d38283609d4c580112eef9de9e1f07a06846af5eaa99d43101f44d5674cf9fec" } }, { "amount": 5000000000000, "target": { "key": "19a162700600ad4658fd1ee75828672b8e1deafec740fe43f38960026c6adb5c" } } ], "extra": [ 1, 180, 55, 6, 20, 229, 219, 87, 169, 127, 102, 194, 126, 20, 74, 63, 204, 155, 54, 156, 97, 141, 253, 174, 198, 77, 230, 114, 79, 133, 143, 38, 102 ], "signatures": [ "8e1be3e1d7fd03d8abc344a96975c23f2f646708ac86529b7fdb978ca88fd708c96011409176e9415e24c44661686927f4cc4a45b9c603f262e4ded96dfca707", "cdfecc6d6cd3590715fd77c6ba9b946c6219394f8660b23cb8981935d3cfe6018e11baf20905e8899b3c4ffc70cef55b0e6c84b7f4a2bb3f8cdea301d60f5101", "02a5eb409e12af4980277d09c8e9347ba4cc65ae819c89997d5657fc2021db03da4351ea999a445bd9c28185decb60557901fc0111595bae1ea5bc51a1e48b04", "4e4f37618ce670012fe85b378550b104c9cfe4ded77fa30714ce0ec53485d600f986118e4bdcd37bb0f26068ac75a7f96ae7060b6576ba5caeec9d5361526003", "28de6048c2abcf8ca6c858b572b558b972e3482354a171e29a37456aa2651c004466a51ba9fa90ecb079db1bb4b57a418867e2b9e86fe03f20b4affc8b650506"] }


Less details
source code | moneroexplorer