Monero Transaction 66f6c6542ecf115947634ab4c6f9e388bbbb16e61bd5d0e4621269a4c5ab3e98

Autorefresh is OFF

Tx hash: 66f6c6542ecf115947634ab4c6f9e388bbbb16e61bd5d0e4621269a4c5ab3e98

Tx prefix hash: 06796f197d17836bd5b3c75994dd509bafbf50231a23a7a8bd0148f4417281cc
Tx public key: 835c285bd4017cc65bea7f5ea65ea6b18cecc163d8ecde1a99e9b0de3e516508
Payment id: 92927457757f7fb806f282b8a3f809843a9fdf67954a33318e0228067df09e45

Transaction 66f6c6542ecf115947634ab4c6f9e388bbbb16e61bd5d0e4621269a4c5ab3e98 was carried out on the Monero network on 2014-07-05 07:08:48. The transaction has 3188505 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404544128 Timestamp [UTC]: 2014-07-05 07:08:48 Age [y:d:h:m:s]: 10:166:08:16:41
Block: 115081 Fee (per_kB): 0.005000000000 (0.007804878049) Tx size: 0.6406 kB
Tx version: 1 No of confirmations: 3188505 RingCT/type: no
Extra: 02210092927457757f7fb806f282b8a3f809843a9fdf67954a33318e0228067df09e4501835c285bd4017cc65bea7f5ea65ea6b18cecc163d8ecde1a99e9b0de3e516508

4 output(s) for total of 1.995000000000 xmr

stealth address amount amount idx tag
00: 6b55906a1fbe827a51e56d25e52a48249b81c41354bc844d68f05703fbb8d8b5 0.005000000000 183079 of 308585 -
01: ecab6d65cc6df426c810bf1c0e7732a44f014eb64f81d81779e9af49502b5aa1 0.090000000000 74175 of 317822 -
02: b65225c8267ed7d86799507c707bab11c7158268abd9ab216c322bea4de6d2b9 0.900000000000 44784 of 454894 -
03: 831f3e9423eb9e26c3fa3110ed9081c32cc854a26212e95ad5a59b295d30418d 1.000000000000 73581 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-04 16:35:57 till 2014-07-05 03:37:41; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________________________________________________________*_______________|
  • |____________________________________________________________________________________________________________________*_____________________________________________________|
  • |________________*_________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________*___________________________________________________________________________________________________|

4 inputs(s) for total of 2.000000000000 xmr

key image 00: b508a9886771c9a293255d01ee74fd4b3bd5a8118d8856b517f1b5551be43c48 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5378f591b91494aecf2d25e170946c41d8dcd2fd7ad94405c897d65ce4675be9 00114823 1 23/73 2014-07-05 02:37:41 10:166:12:47:48
key image 01: 3871ff3f4f4e59cc2401d71f51ea6a398f8289b1b8aa466a3ddea6326c448c10 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8aeadbaf181a05fb8eac43df1c866e813c010e3f427cc8256f191e80a2ddda1a 00114665 1 15/71 2014-07-05 00:06:53 10:166:15:18:36
key image 02: b5affbbfe3c9e91d52b65988de0867305d03ed79a3b10f09d94c7cc9042dddcc amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 64b80bc0df3d1ff2a991e08e9b4bbff970663a8556f87c39c932a12b9106fbcf 00114277 1 11/67 2014-07-04 17:35:57 10:166:21:49:32
key image 03: ccf4a35825c86b48f479ca90a5653c95f3aed3ec09c299b4c461e174d3f9fb5d amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ff406ff62ab605705031b6c526a40b878c6507416bfb2d646a8037f3dcee7f5d 00114472 1 21/67 2014-07-04 21:06:30 10:166:18:18:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 91551 ], "k_image": "b508a9886771c9a293255d01ee74fd4b3bd5a8118d8856b517f1b5551be43c48" } }, { "key": { "amount": 500000000000, "key_offsets": [ 91159 ], "k_image": "3871ff3f4f4e59cc2401d71f51ea6a398f8289b1b8aa466a3ddea6326c448c10" } }, { "key": { "amount": 500000000000, "key_offsets": [ 90125 ], "k_image": "b5affbbfe3c9e91d52b65988de0867305d03ed79a3b10f09d94c7cc9042dddcc" } }, { "key": { "amount": 500000000000, "key_offsets": [ 90699 ], "k_image": "ccf4a35825c86b48f479ca90a5653c95f3aed3ec09c299b4c461e174d3f9fb5d" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "6b55906a1fbe827a51e56d25e52a48249b81c41354bc844d68f05703fbb8d8b5" } }, { "amount": 90000000000, "target": { "key": "ecab6d65cc6df426c810bf1c0e7732a44f014eb64f81d81779e9af49502b5aa1" } }, { "amount": 900000000000, "target": { "key": "b65225c8267ed7d86799507c707bab11c7158268abd9ab216c322bea4de6d2b9" } }, { "amount": 1000000000000, "target": { "key": "831f3e9423eb9e26c3fa3110ed9081c32cc854a26212e95ad5a59b295d30418d" } } ], "extra": [ 2, 33, 0, 146, 146, 116, 87, 117, 127, 127, 184, 6, 242, 130, 184, 163, 248, 9, 132, 58, 159, 223, 103, 149, 74, 51, 49, 142, 2, 40, 6, 125, 240, 158, 69, 1, 131, 92, 40, 91, 212, 1, 124, 198, 91, 234, 127, 94, 166, 94, 166, 177, 140, 236, 193, 99, 216, 236, 222, 26, 153, 233, 176, 222, 62, 81, 101, 8 ], "signatures": [ "3f2e62844228c1ffe22b8a23e76044d775816d5e39baa6947974f21baafac70c6d21fde90f083075a2cbcb07ff3cbd559a37db802055f45249aa61f88256eb07", "b5beb72f21d3bc193742d1022928c62b5e94baa363d140fede761240df2e0f0d4d82df7d428fc2c7a68009826db09ed5d539255e75842bd946ada598ce5d150c", "df3a2cf53ed3144d3d0f80f13e0d282686ca46751ef1162fed2f83e2c918570f1d51691d46cfc3c2eb0101f452c0f965a4ae89e454134671c8dc81902f910a05", "1f7dab5d7916cd7a6bc63f108fe6f10e9764b445605ddf8acab9edd5ea1a2b0240d408666e25832e1ac5ec080da01a5b7658e6dc4462e448c132b9e991c93c0b"] }


Less details
source code | moneroexplorer