Monero Transaction 66f94213c6f3262c4de8f055bfefd3913935e59866624f2ccf45547436ac6b00

Autorefresh is OFF

Tx hash: 66f94213c6f3262c4de8f055bfefd3913935e59866624f2ccf45547436ac6b00

Tx prefix hash: 0cf9db54fa41589f5f4222625cb972a7c9896d0c8329f5b18acf2c7f2294daff
Tx public key: 9a626606a3c70c4a287017cf2055d6811caf470937343cd960ce7597466b790d
Payment id: 23f8c727ce3d48f49ef3ab2a777d3377dd0d29af2f9744bdabdcc845e2c36479

Transaction 66f94213c6f3262c4de8f055bfefd3913935e59866624f2ccf45547436ac6b00 was carried out on the Monero network on 2014-08-10 02:18:31. The transaction has 3127911 confirmations. Total output fee is 0.005759500000 XMR.

Timestamp: 1407637111 Timestamp [UTC]: 2014-08-10 02:18:31 Age [y:d:h:m:s]: 10:117:22:11:12
Block: 166642 Fee (per_kB): 0.005759500000 (0.008535062229) Tx size: 0.6748 kB
Tx version: 1 No of confirmations: 3127911 RingCT/type: no
Extra: 02210023f8c727ce3d48f49ef3ab2a777d3377dd0d29af2f9744bdabdcc845e2c36479019a626606a3c70c4a287017cf2055d6811caf470937343cd960ce7597466b790d

7 output(s) for total of 3.394240500000 xmr

stealth address amount amount idx tag
00: 3acfca92f1e1adc0161cbd4481a64b787e3902cdb5188e5074bd005baa2feeb7 0.004240500000 0 of 1 -
01: 8ded00fe9770d16313a5c8a61ab7baf27c950c47bb0681d905b379565a5477af 0.040000000000 132511 of 294095 -
02: 227fae1af1caf0c4f5ff45f1ec2f6de86e6f2c2e3b1bd28e161787e16015e1c3 0.050000000000 116936 of 284521 -
03: 4e6c6c72b8d3e7342d99c4684ffeb0e43685617cae5fb40b00ddcb902eb7434a 0.100000000000 399504 of 982315 -
04: 091812160c7815cb79821f16f24c8e4fd31821c8ad120f74ff6e0714787786e4 0.200000000000 341915 of 1272210 -
05: 305b97bbd6f99ea9fe4373fba916dbcd9afbe2d779fa1f8cc78f16882532c803 1.000000000000 178174 of 874629 -
06: 8df8f00adc56a0a6afc101208fc89685d9cd720e871a94d3eaacb9c6e739d110 2.000000000000 69728 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-03 03:30:38 till 2014-08-09 23:24:54; resolution: 0.40 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________*____________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 3.400000000000 xmr

key image 00: d8cbad719c5d06882a31499fae61484888d2189125e793b14446f2f37225b249 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4393531b1329eccf5ddd0ab520e55001d795fe63b7da314178345f13f15ba133 00068531 1 3/40 2014-06-03 04:30:38 10:185:19:59:05
- 01: 01bc3d98d3e2ea0736be6b3ffed8d8e4812ec7d849175670e43aa7719c37abc9 00166112 2 1/6 2014-08-09 17:16:37 10:118:07:13:06
key image 01: ee0d7f6939af16d0c7dcc1367015001632735c1899273c3e90a3db2d34b6cb5a amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2355c962a9b4c7117d0e978734b4680a07728a5aa6ccac99832cf7470f81e1ee 00084669 1 4/94 2014-06-14 08:12:51 10:174:16:16:52
- 01: 16494f94dec7f072fb0d3a3714506ca7828870017929adf97917d3dcf3d6a74a 00166435 2 1/9 2014-08-09 22:24:54 10:118:02:04:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 12560, 129010 ], "k_image": "d8cbad719c5d06882a31499fae61484888d2189125e793b14446f2f37225b249" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 8937, 34244 ], "k_image": "ee0d7f6939af16d0c7dcc1367015001632735c1899273c3e90a3db2d34b6cb5a" } } ], "vout": [ { "amount": 4240500000, "target": { "key": "3acfca92f1e1adc0161cbd4481a64b787e3902cdb5188e5074bd005baa2feeb7" } }, { "amount": 40000000000, "target": { "key": "8ded00fe9770d16313a5c8a61ab7baf27c950c47bb0681d905b379565a5477af" } }, { "amount": 50000000000, "target": { "key": "227fae1af1caf0c4f5ff45f1ec2f6de86e6f2c2e3b1bd28e161787e16015e1c3" } }, { "amount": 100000000000, "target": { "key": "4e6c6c72b8d3e7342d99c4684ffeb0e43685617cae5fb40b00ddcb902eb7434a" } }, { "amount": 200000000000, "target": { "key": "091812160c7815cb79821f16f24c8e4fd31821c8ad120f74ff6e0714787786e4" } }, { "amount": 1000000000000, "target": { "key": "305b97bbd6f99ea9fe4373fba916dbcd9afbe2d779fa1f8cc78f16882532c803" } }, { "amount": 2000000000000, "target": { "key": "8df8f00adc56a0a6afc101208fc89685d9cd720e871a94d3eaacb9c6e739d110" } } ], "extra": [ 2, 33, 0, 35, 248, 199, 39, 206, 61, 72, 244, 158, 243, 171, 42, 119, 125, 51, 119, 221, 13, 41, 175, 47, 151, 68, 189, 171, 220, 200, 69, 226, 195, 100, 121, 1, 154, 98, 102, 6, 163, 199, 12, 74, 40, 112, 23, 207, 32, 85, 214, 129, 28, 175, 71, 9, 55, 52, 60, 217, 96, 206, 117, 151, 70, 107, 121, 13 ], "signatures": [ "0c6969f21b39a7a58ee745ecb74bb57631e3e8dc25e462fb3925ce3605026c060e318e5957aa6a7060b563a7e07050136e0e4fb36d1f4d0367518b890a18410e78d1e5a2900ca0c1fa7aa8151ff2f4e132025d7119ab9931e985dfab904e2009f24258dd6a3da730c7d74045ecbc1d9ada8f9cfd3b1cc6b64945ac226cbcb80e", "c6b433d10c581f819d9051db3602f8ad45d5b0d7b6fb43126bf409a37d8b500bf94968dae42d2a0403d707a89295ef07b47144797c4a2dea49f6fefce091d40baf485991cf61eb3b3b4f510019e663454d609b8b2af079d271c7c16638b18a0d82be7254b8a77e8bf45768fc3dc9da834cd3cc67f6fab29a071535cd050cc706"] }


Less details
source code | moneroexplorer