Monero Transaction 676e57f349c9d23eba304725355db48e45e3bdf5aaaca75ab5cc47bcc4eff4b8

Autorefresh is OFF

Tx hash: 676e57f349c9d23eba304725355db48e45e3bdf5aaaca75ab5cc47bcc4eff4b8

Tx prefix hash: c49a9c7f34e5e3b9bfc64a8bb316d86836bda912909733e23efbadd7579e4cb5
Tx public key: 85d9d98ad952dcbef107b65cecf4cfc851abad9dc693955c83a9a8e8cdb2e4ff
Payment id: 7f50de39b79bdfd5a020a5e4d3c8188173cd17aa42ba4cd1f43a3b5fb46e85aa

Transaction 676e57f349c9d23eba304725355db48e45e3bdf5aaaca75ab5cc47bcc4eff4b8 was carried out on the Monero network on 2014-09-28 14:53:03. The transaction has 3052401 confirmations. Total output fee is 0.198090923429 XMR.

Timestamp: 1411915983 Timestamp [UTC]: 2014-09-28 14:53:03 Age [y:d:h:m:s]: 10:062:05:11:36
Block: 237651 Fee (per_kB): 0.198090923429 (0.345562360462) Tx size: 0.5732 kB
Tx version: 1 No of confirmations: 3052401 RingCT/type: no
Extra: 0221007f50de39b79bdfd5a020a5e4d3c8188173cd17aa42ba4cd1f43a3b5fb46e85aa0185d9d98ad952dcbef107b65cecf4cfc851abad9dc693955c83a9a8e8cdb2e4ff

5 output(s) for total of 13.806379710000 xmr

stealth address amount amount idx tag
00: f0a29325a30743df929dd8b681a4adfd560bde23a52730948b942962bff1b64b 0.006379710000 0 of 2 -
01: 067bda346cb6939d82ca5d29a9a0ddee3f2d7d126a2858e517f5cf61a82c6b16 0.300000000000 258030 of 976536 -
02: ea1d7bac7abae341bf8ae88c0b4a0c446430516fefa9876d4563668a80343403 0.500000000000 346281 of 1118624 -
03: e8194adcc871e6b26208310df9fbd01060b175591d0fb8bd50442b02912a03b0 3.000000000000 65139 of 300495 -
04: e057c08f94488f1094fe725160d438cff2963a73eac5fc0efb2a4c2caea42f7d 10.000000000000 276572 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-23 13:40:53 till 2014-09-28 10:12:24; resolution: 0.21 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

3 inputs(s) for total of 14.004470633429 xmr

key image 00: 6080c0b2b9e2046c3e8120ce00544f0fd154b14231733ee32c76a4ccc63cb8ba amount: 0.004470633429
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 705bece5029cb86ff4bfba72c5b974f575fb651f60a6a535b0bf4c00e7786843 00186078 0 0/5 2014-08-23 14:40:53 10:098:05:23:46
key image 01: 32d85fdf0cc6c6e6d5b1f560403d421ec3f5075753cfc4f5ff7976defbda44eb amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 607f2562952457e2bd7cffaec7a5cd2fa8d57a43b36dbb064ea892565f6951a4 00237320 0 0/3 2014-09-28 09:12:24 10:062:10:52:15
key image 02: 2287582c00cff9c29f07f0ce5e66aa800ac73bc3a75ed3b541c8991110ec7c80 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0f40cced46946e46a6683d8d74009dfea4711708622d01b3fc395dff77ca23a5 00236511 0 0/3 2014-09-27 19:39:40 10:063:00:24:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4470633429, "key_offsets": [ 0 ], "k_image": "6080c0b2b9e2046c3e8120ce00544f0fd154b14231733ee32c76a4ccc63cb8ba" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 114148 ], "k_image": "32d85fdf0cc6c6e6d5b1f560403d421ec3f5075753cfc4f5ff7976defbda44eb" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 275237 ], "k_image": "2287582c00cff9c29f07f0ce5e66aa800ac73bc3a75ed3b541c8991110ec7c80" } } ], "vout": [ { "amount": 6379710000, "target": { "key": "f0a29325a30743df929dd8b681a4adfd560bde23a52730948b942962bff1b64b" } }, { "amount": 300000000000, "target": { "key": "067bda346cb6939d82ca5d29a9a0ddee3f2d7d126a2858e517f5cf61a82c6b16" } }, { "amount": 500000000000, "target": { "key": "ea1d7bac7abae341bf8ae88c0b4a0c446430516fefa9876d4563668a80343403" } }, { "amount": 3000000000000, "target": { "key": "e8194adcc871e6b26208310df9fbd01060b175591d0fb8bd50442b02912a03b0" } }, { "amount": 10000000000000, "target": { "key": "e057c08f94488f1094fe725160d438cff2963a73eac5fc0efb2a4c2caea42f7d" } } ], "extra": [ 2, 33, 0, 127, 80, 222, 57, 183, 155, 223, 213, 160, 32, 165, 228, 211, 200, 24, 129, 115, 205, 23, 170, 66, 186, 76, 209, 244, 58, 59, 95, 180, 110, 133, 170, 1, 133, 217, 217, 138, 217, 82, 220, 190, 241, 7, 182, 92, 236, 244, 207, 200, 81, 171, 173, 157, 198, 147, 149, 92, 131, 169, 168, 232, 205, 178, 228, 255 ], "signatures": [ "2a2c056adbc57f8fc55ccbc712957243b2adc066d2e8c89f9bef3cbe6ad84200c601e236cdb30b9b2a04a0ee1deec328da1c14ec2ba1685cd39db06449f7a305", "7cf4b64af5a6d4acd467d0f2f918c05f5080f6e0c301d00b1e80573cd89a110e592bddf30cc29306873a4fe4e65ce16915a535bfcdd486816690b15418192e06", "14cc8229a4ee4b85e18a35711137e9a293157d9312d3364864b8b71ba32a9c0eb3e6f5313d5b09f3dfaa3a766a556746e45025a1ccc8ad7b12cdbee8b34a9f0d"] }


Less details
source code | moneroexplorer