Monero Transaction 66a5663d0607593e10b69f726d014fc563be5fd7ce68f817b3a68da7277a16fb

Autorefresh is OFF

Tx hash: 66a5663d0607593e10b69f726d014fc563be5fd7ce68f817b3a68da7277a16fb

Tx prefix hash: 21cc626c1b5f83381414842169faece316bcaf2c89b56b2d1a027073f283928e
Tx public key: 472c092c3c055b99fb2905c5e7ff1587cad8a377b221cc96b90082ce8584ab43

Transaction 66a5663d0607593e10b69f726d014fc563be5fd7ce68f817b3a68da7277a16fb was carried out on the Monero network on 2015-12-04 01:22:13. The transaction has 2458428 confirmations. Total output fee is 0.016878098374 XMR.

Timestamp: 1449192133 Timestamp [UTC]: 2015-12-04 01:22:13 Age [y:d:h:m:s]: 09:025:22:21:00
Block: 853322 Fee (per_kB): 0.016878098374 (0.024796517554) Tx size: 0.6807 kB
Tx version: 1 No of confirmations: 2458428 RingCT/type: no
Extra: 01472c092c3c055b99fb2905c5e7ff1587cad8a377b221cc96b90082ce8584ab43

6 output(s) for total of 7.990730170000 xmr

stealth address amount amount idx tag
00: f0aa347daf36b7e8aa2d2adc894332c26f56bb20c6a93b8c97d67d6c89058e62 0.000730170000 0 of 1 -
01: f2be1e13c668ad14c14132595e193aead4a8e5cef2690ff5a6bab5033554d4e7 0.020000000000 291422 of 381492 -
02: dba41d244d083d4efc213e361df024f35b83f57354e9dd2fd91b02acb48621ce 0.070000000000 171193 of 263947 -
03: abc485c98b862e5db6f3a9b279c513f89d53a123970d8cf50bab5b7232e31bcb 0.100000000000 836858 of 982315 -
04: 490ae9fff534e31ac8f3bc872c6d19a7c1b98b15eb4538735d36bd0b78491444 0.800000000000 364692 of 489955 -
05: cce62bc124cec377a0514f724a122bec43f003de7cd25b7ffdc4607399d39804 7.000000000000 117289 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-11-29 01:08:06 till 2015-12-03 12:21:45; resolution: 0.03 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__________________________________________________________________________________________________*_______________________________________________________________________|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________*________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 8.007608268374 xmr

key image 00: 98035ceb9435353cc70f53894365b4685a5491fdc0134f231ad73dfa27dc6423 amount: 0.007608268374
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0b0da296536175f751eb38452501df5ae754023036a9938f0c98c4404a6691cf 00852537 0 0/4 2015-12-03 11:21:45 09:026:12:21:28
key image 01: e2e52e188402867a828d63967341b27410314e808d02d463cfa0cff936e8b285 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7fdc34339a5da4e3de5afc97488f95da1f436bc24864ebc3645466eb0fc47529 00849996 0 0/4 2015-12-01 14:59:40 09:028:08:43:33
key image 02: 1d39ba3634a4141ff00a8ff82adcd4b927ad155334281e2705c21a198fd36048 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f5ae611859d5f4f83442cdc05f4aed673675d73f70620c95609de1dceb764250 00846294 1 5/7 2015-11-29 02:08:06 09:030:21:35:07
key image 03: 82ed991a01976378c30619848e4236d988294aca6e03d4a5da1c7e7dbc7ba418 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7c72d8fcb059b94f4879a81579abc58da5d05a1431ecc68b179989b8a4be6eb5 00847758 1 6/6 2015-11-30 02:39:24 09:029:21:03:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7608268374, "key_offsets": [ 0 ], "k_image": "98035ceb9435353cc70f53894365b4685a5491fdc0134f231ad73dfa27dc6423" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 113695 ], "k_image": "e2e52e188402867a828d63967341b27410314e808d02d463cfa0cff936e8b285" } }, { "key": { "amount": 800000000000, "key_offsets": [ 357032 ], "k_image": "1d39ba3634a4141ff00a8ff82adcd4b927ad155334281e2705c21a198fd36048" } }, { "key": { "amount": 200000000000, "key_offsets": [ 1040038 ], "k_image": "82ed991a01976378c30619848e4236d988294aca6e03d4a5da1c7e7dbc7ba418" } } ], "vout": [ { "amount": 730170000, "target": { "key": "f0aa347daf36b7e8aa2d2adc894332c26f56bb20c6a93b8c97d67d6c89058e62" } }, { "amount": 20000000000, "target": { "key": "f2be1e13c668ad14c14132595e193aead4a8e5cef2690ff5a6bab5033554d4e7" } }, { "amount": 70000000000, "target": { "key": "dba41d244d083d4efc213e361df024f35b83f57354e9dd2fd91b02acb48621ce" } }, { "amount": 100000000000, "target": { "key": "abc485c98b862e5db6f3a9b279c513f89d53a123970d8cf50bab5b7232e31bcb" } }, { "amount": 800000000000, "target": { "key": "490ae9fff534e31ac8f3bc872c6d19a7c1b98b15eb4538735d36bd0b78491444" } }, { "amount": 7000000000000, "target": { "key": "cce62bc124cec377a0514f724a122bec43f003de7cd25b7ffdc4607399d39804" } } ], "extra": [ 1, 71, 44, 9, 44, 60, 5, 91, 153, 251, 41, 5, 197, 231, 255, 21, 135, 202, 216, 163, 119, 178, 33, 204, 150, 185, 0, 130, 206, 133, 132, 171, 67 ], "signatures": [ "436206a410c760948d1180d46d37d885b193738df9c98c7e19a9795c6caa370a86e9a48904d72a3b93a4919b0899f48e3141abb103cfa1f12168e41a40b9bf0d", "3a2a3f35f0e6af2a2380a54b1f5c395ebd8bd66874ca73577d20546950222b03b951028b0c843e650c5e2dfb61388fe290b71b892f32b2b4efef68a89d159706", "710a7011cce79231efd097cd77c79b2b71a65fa436bbc687dbe4831370258e01375466a09fc16d9740941a6ab0f23b3fe7d00eb46a549ef75c14afacbc4c4c0a", "de4d881ea00b4511e06264419e65859a829561af568025dda6e1dd5b0db0be0f77f75d9b8ff088cba1ddfe2dd97fa8a36871c4581bf5fcf79acb44109afaf501"] }


Less details
source code | moneroexplorer