Monero Transaction 66896f7579baf92c2cf7904eadd6ac77934ccc7b713f6b8125909bc366905acf

Autorefresh is OFF

Tx hash: 66896f7579baf92c2cf7904eadd6ac77934ccc7b713f6b8125909bc366905acf

Tx prefix hash: b4e0f2123004c9e1a47fcd5840babafc0f54e316dcc1173b5351412681afccb4
Tx public key: 0d354877402740aab0246f4016c59f692d969e28d394db51e3658df7c50e60cd
Payment id: dbc2abed391566af667a7e58c6b71ccd01bf36494def274ad62268ccf14e63e4

Transaction 66896f7579baf92c2cf7904eadd6ac77934ccc7b713f6b8125909bc366905acf was carried out on the Monero network on 2014-07-18 18:43:11. The transaction has 3145714 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405708991 Timestamp [UTC]: 2014-07-18 18:43:11 Age [y:d:h:m:s]: 10:120:10:56:03
Block: 134523 Fee (per_kB): 0.005000000000 (0.010622406639) Tx size: 0.4707 kB
Tx version: 1 No of confirmations: 3145714 RingCT/type: no
Extra: 022100dbc2abed391566af667a7e58c6b71ccd01bf36494def274ad62268ccf14e63e4010d354877402740aab0246f4016c59f692d969e28d394db51e3658df7c50e60cd

5 output(s) for total of 5.000000000000 xmr

stealth address amount amount idx tag
00: 291bd06837e0e3d1acc3fbb17ef234fc92db989e45f3fe2a87c1dc0e8dbf2832 0.050000000000 106381 of 284521 -
01: 74d1a7060b03af69a51dc2dc508bbca85e87f582a25a350cfb461a921f885846 0.050000000000 106382 of 284521 -
02: f6fc4e37b8ccf57d8af3f17a3517259ebfabe15db47d304ec4270f9a85e89105 0.100000000000 291215 of 982315 -
03: 87dccca32f41429ce9551660b410eb0cf88d862b6633b81ad327c794fbce0304 0.800000000000 71844 of 489955 -
04: aad93e878f956bffaa78afb3790f740d4078652bd1dc88cd874242a9a9f1c121 4.000000000000 24667 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-18 17:09:46 till 2014-07-18 19:26:18; resolution: 0.00 days)

  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|

2 inputs(s) for total of 5.005000000000 xmr

key image 00: 977b352188f7653259e4455a438ecca046c32733c71bcfb7506314e7559c5447 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6b263dd4da8f3f3c7974de4ebbf25548738ab53eac4d887a8c5919dfea302af 00134493 1 4/5 2014-07-18 18:09:46 10:120:11:29:28
key image 01: ce2b0313a93dd07d1b6fb40f8487e110eedae0eadfd6052238bf5936b0be0c58 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e7e1aec8c6db2e5d2c9ac87b89b48925e5c85521c549280fa734fa417bc21da2 00134507 1 6/10 2014-07-18 18:26:18 10:120:11:12:56
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 190507 ], "k_image": "977b352188f7653259e4455a438ecca046c32733c71bcfb7506314e7559c5447" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 59486 ], "k_image": "ce2b0313a93dd07d1b6fb40f8487e110eedae0eadfd6052238bf5936b0be0c58" } } ], "vout": [ { "amount": 50000000000, "target": { "key": "291bd06837e0e3d1acc3fbb17ef234fc92db989e45f3fe2a87c1dc0e8dbf2832" } }, { "amount": 50000000000, "target": { "key": "74d1a7060b03af69a51dc2dc508bbca85e87f582a25a350cfb461a921f885846" } }, { "amount": 100000000000, "target": { "key": "f6fc4e37b8ccf57d8af3f17a3517259ebfabe15db47d304ec4270f9a85e89105" } }, { "amount": 800000000000, "target": { "key": "87dccca32f41429ce9551660b410eb0cf88d862b6633b81ad327c794fbce0304" } }, { "amount": 4000000000000, "target": { "key": "aad93e878f956bffaa78afb3790f740d4078652bd1dc88cd874242a9a9f1c121" } } ], "extra": [ 2, 33, 0, 219, 194, 171, 237, 57, 21, 102, 175, 102, 122, 126, 88, 198, 183, 28, 205, 1, 191, 54, 73, 77, 239, 39, 74, 214, 34, 104, 204, 241, 78, 99, 228, 1, 13, 53, 72, 119, 64, 39, 64, 170, 176, 36, 111, 64, 22, 197, 159, 105, 45, 150, 158, 40, 211, 148, 219, 81, 227, 101, 141, 247, 197, 14, 96, 205 ], "signatures": [ "22f82024420c6db8c65ef91719f199b566b6baea38591fa0729e588afcb12b069eb0226f8f9cf6cffcb001e389b49fe6158f3a66c724fe4e6289575414e27d02", "94652ce473a9c980619c9b531157e29c20b9720f04e9205d263c7826382b5c038f507b4088dacb4076e42ddc27f60d9e4ff7f89a620850e06e4ecc9a9f17af06"] }


Less details
source code | moneroexplorer