Monero Transaction 66d68cf1ba1a10320c23bbb84c7b2d4eb1e2f5d248cddbb00b58ce8b40fde21b

Autorefresh is OFF

Tx hash: 66d68cf1ba1a10320c23bbb84c7b2d4eb1e2f5d248cddbb00b58ce8b40fde21b

Tx prefix hash: 560ec89d55d83ee1574257e2be1915db50f17bf305c7dba103be9cd563f7d943
Tx public key: 2babf9f8e2515fcacd09a29fe9616893a72c799c82734dd0296e7b7273410d5c
Payment id: 85372379452576a1642936009148380d6cedd7d9824784f262b813de61312fa0

Transaction 66d68cf1ba1a10320c23bbb84c7b2d4eb1e2f5d248cddbb00b58ce8b40fde21b was carried out on the Monero network on 2016-08-03 22:24:20. The transaction has 2195630 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1470263060 Timestamp [UTC]: 2016-08-03 22:24:20 Age [y:d:h:m:s]: 08:132:15:41:32
Block: 1105739 Fee (per_kB): 0.010000000000 (0.013653333333) Tx size: 0.7324 kB
Tx version: 1 No of confirmations: 2195630 RingCT/type: no
Extra: 02210085372379452576a1642936009148380d6cedd7d9824784f262b813de61312fa0012babf9f8e2515fcacd09a29fe9616893a72c799c82734dd0296e7b7273410d5c

5 output(s) for total of 20.990000000000 xmr

stealth address amount amount idx tag
00: 247394a5667f67ffbed3969819455a71a25154f6d39e0354fce794b47f161a96 0.090000000000 243170 of 317822 -
01: de89755338a41ecce2ebc95a519a4d66790c96a7e0e5a7dfb50adf6d3f689d8e 0.900000000000 381186 of 454894 -
02: 2b808044e94db2c729ae9cc08dcb08b403f243a0331b07f08829caf2c9cbca1e 3.000000000000 264235 of 300495 -
03: 87b672fdde8a7a88b0c270200a97a00ea6bce25451c728ee8f12dd879923bd51 7.000000000000 258434 of 285521 -
04: e887395a207f616d833bc915f7e7984fede07f1228baa0c47fce20457a7d2ca0 10.000000000000 824305 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-21 04:18:23 till 2016-07-17 00:39:44; resolution: 3.01 days)

  • |_**______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________*____________________________________________*_________________________________________*___________|

2 inputs(s) for total of 21.000000000000 xmr

key image 00: 488f697b40df42951c6112662d21c4fb2a2407fce556ea2c4753251de134dc31 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 46ba1a548a2fc315793a675a74aa799cf557de01f9cf0e7a8e9e15c9d1ff6bf4 00445435 1 90/6 2015-02-21 05:18:23 09:297:08:47:29
- 01: 5985fb2794fb50ba3e7238f78ad9f7304f4ff0bca931fc2789f1c9b3566398cc 00453402 0 0/4 2015-02-26 16:52:47 09:291:21:13:05
- 02: 5750e5ab4dda82097f365a1d84c04d9289b705262482dc533595d53f85d8c2e2 01092889 4 2/4 2016-07-16 23:39:44 08:150:14:26:08
key image 01: 2827d557cce3170323de257a38c8cbb9a5555a5ba08d0677d243321d7065f24e amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 42f8e4e9b5bd5bab4c00d690f2eea45a57ec4d97001aafe8489e34a416fae285 00750155 4 3/143 2015-09-22 08:19:54 09:084:05:45:58
- 01: f31fee8b36de8b1757fb09fb22b509130e0e708eb7ac7d4cac3f047e7ecb5dd2 00943778 1 16/5 2016-02-06 01:08:23 08:312:12:57:29
- 02: 065decdd5674611a6e0bfdb6327fa27e278ef39f37561ee51caebd7c1d8ef094 01066920 5 12/4 2016-06-11 03:08:15 08:186:10:57:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 449676, 11106, 283688 ], "k_image": "488f697b40df42951c6112662d21c4fb2a2407fce556ea2c4753251de134dc31" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 40982, 6742, 8146 ], "k_image": "2827d557cce3170323de257a38c8cbb9a5555a5ba08d0677d243321d7065f24e" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "247394a5667f67ffbed3969819455a71a25154f6d39e0354fce794b47f161a96" } }, { "amount": 900000000000, "target": { "key": "de89755338a41ecce2ebc95a519a4d66790c96a7e0e5a7dfb50adf6d3f689d8e" } }, { "amount": 3000000000000, "target": { "key": "2b808044e94db2c729ae9cc08dcb08b403f243a0331b07f08829caf2c9cbca1e" } }, { "amount": 7000000000000, "target": { "key": "87b672fdde8a7a88b0c270200a97a00ea6bce25451c728ee8f12dd879923bd51" } }, { "amount": 10000000000000, "target": { "key": "e887395a207f616d833bc915f7e7984fede07f1228baa0c47fce20457a7d2ca0" } } ], "extra": [ 2, 33, 0, 133, 55, 35, 121, 69, 37, 118, 161, 100, 41, 54, 0, 145, 72, 56, 13, 108, 237, 215, 217, 130, 71, 132, 242, 98, 184, 19, 222, 97, 49, 47, 160, 1, 43, 171, 249, 248, 226, 81, 95, 202, 205, 9, 162, 159, 233, 97, 104, 147, 167, 44, 121, 156, 130, 115, 77, 208, 41, 110, 123, 114, 115, 65, 13, 92 ], "signatures": [ "f70a11eb233ffaea6436c513c61dc1d510c776e9c496c3f6b6608f9f78e54909b6ae4761ad2023ddb69099b98e7c12f01a8baca42e42d6d89d03be4b2e29f305cd1ef549d358861bfd33af3b57d6222588f6ae4c061720abad267e15d594bf0f918c29bbe636e8928d56fd4a6b1089d5b6571e5ee7058ae3cef133b1869b4606ac514d8db496a11d4ba64469db9e96a01c165d6cfabc3aeff01698c2edfd440ca92f94f8c59018bef2008ebd2934884fd4469149397c218f53c3f48d22eae90e", "4e4a85f850c5baf0aae97ac02cc0fd36a62859a221aba30367f3a76a2bd01706b2e3b74bb84cb6f83143cb2b1930db86f796be0fdf4705e856afd27bfd4041086e892075c77eaee7e3966465b59d22712dc733793fdd63348fb98f22f47a8c06388257d9727602b8140e70554bce65001e727f1f9d95db11ada166cbf147720136f3244189ea3089a36d7f8cbc2dc2ed54e7ac4cbea53faaa16913c84fb86e024148d52b2e93d7015d3ee66d7a6496c6553759b3267d8fa1cc71927700f2b70b"] }


Less details
source code | moneroexplorer