Monero Transaction 69067c008ad417e492f3df0bd08e24ed0ee989d8f5df590d161c8f113c620267

Autorefresh is OFF

Tx hash: 69067c008ad417e492f3df0bd08e24ed0ee989d8f5df590d161c8f113c620267

Tx prefix hash: 61250cdb801138151c90843aa5605afb179db3895d9671f3f883d3f1b8c784a6
Tx public key: 52063c32c68556c4899eb36f14cb67b692891befeb593f81ada994f1a376201b
Payment id: 208ce02d886d144f98ea4af9845ea682347c372c0195cfe4015177705c74c5a1

Transaction 69067c008ad417e492f3df0bd08e24ed0ee989d8f5df590d161c8f113c620267 was carried out on the Monero network on 2014-08-08 08:28:33. The transaction has 3128135 confirmations. Total output fee is 0.005972930000 XMR.

Timestamp: 1407486513 Timestamp [UTC]: 2014-08-08 08:28:33 Age [y:d:h:m:s]: 10:116:12:35:49
Block: 164131 Fee (per_kB): 0.005972930000 (0.007963906667) Tx size: 0.7500 kB
Tx version: 1 No of confirmations: 3128135 RingCT/type: no
Extra: 022100208ce02d886d144f98ea4af9845ea682347c372c0195cfe4015177705c74c5a10152063c32c68556c4899eb36f14cb67b692891befeb593f81ada994f1a376201b

9 output(s) for total of 10.074027070000 xmr

stealth address amount amount idx tag
00: 53cc76ef138add00eb9a8a4120fb737ca0afeb8347ae46771abe7c84e527d3e5 0.000027070000 0 of 1 -
01: ef8635edba8a75e38b5a5ecbfd8156ba8e53f574753b867b6e92a46261a73b2f 0.006000000000 180431 of 256624 -
02: 2c4e5ae02fcfaaace15fcd5c7cdaa67ba75414a141e3328f44a9a6f339d383ce 0.008000000000 164397 of 245068 -
03: 7dd4e546809c3d4da55176e7162d64710b25228916613540678a833935693555 0.030000000000 159394 of 324336 -
04: 357f3fb2226e6d552973c0130bbb65222d1ecd58b12c1c084647cce8a3877bae 0.030000000000 159395 of 324336 -
05: f9aaf489bde41584443280ae76675aa736901c760075fc1be516930358f631d1 0.400000000000 139064 of 688584 -
06: 929de0f35f2d7d23e2be3a2141cbccf987952d274bf6ea54ffd37d6f7f71ec6c 0.600000000000 137022 of 650760 -
07: 020f196642ea89d0e1b5f81419d154670c55ec4a987a2256cfe727b54d1cc32e 1.000000000000 174048 of 874629 -
08: 4f5b487c406b26c06648e45ae3859090fdd3e1d289c82ccd03e7c18bf700e263 8.000000000000 13112 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-18 16:46:56 till 2014-08-08 07:54:13; resolution: 0.48 days)

  • |_______________________________________*_________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 10.080000000000 xmr

key image 00: cbaca87c31f816e916938a4dc01abc29ecb4ab4a428464fa192f9ecc49d4bff5 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2b3ff42f4aabe0fd91c9dce65362910df9018724021165f1d3e6a27817d57b6c 00072734 1 12/59 2014-06-06 03:07:02 10:179:17:57:20
- 01: 6f84dd593571c8257b784984f098fd400bea937f24babdb3f4ab06dea0aea20b 00164015 0 0/5 2014-08-08 06:54:13 10:116:14:10:09
key image 01: 8d4cc42c91e0124dd4e1c9ce5b189d1ae53ec2898358d393b0b16165bf5d8a36 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8b5a3b8b362673e87cdf343717ee931acad8376f4860aa04680ff8359e90a356 00045710 0 0/9 2014-05-18 17:46:56 10:198:03:17:26
- 01: 019e31bf39fb5561df5888ba568e533ab0547845da8d60f7f20ab1818168ac57 00163996 0 0/4 2014-08-08 06:39:49 10:116:14:24:33
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000, "key_offsets": [ 23540, 65690 ], "k_image": "cbaca87c31f816e916938a4dc01abc29ecb4ab4a428464fa192f9ecc49d4bff5" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 45553, 143006 ], "k_image": "8d4cc42c91e0124dd4e1c9ce5b189d1ae53ec2898358d393b0b16165bf5d8a36" } } ], "vout": [ { "amount": 27070000, "target": { "key": "53cc76ef138add00eb9a8a4120fb737ca0afeb8347ae46771abe7c84e527d3e5" } }, { "amount": 6000000000, "target": { "key": "ef8635edba8a75e38b5a5ecbfd8156ba8e53f574753b867b6e92a46261a73b2f" } }, { "amount": 8000000000, "target": { "key": "2c4e5ae02fcfaaace15fcd5c7cdaa67ba75414a141e3328f44a9a6f339d383ce" } }, { "amount": 30000000000, "target": { "key": "7dd4e546809c3d4da55176e7162d64710b25228916613540678a833935693555" } }, { "amount": 30000000000, "target": { "key": "357f3fb2226e6d552973c0130bbb65222d1ecd58b12c1c084647cce8a3877bae" } }, { "amount": 400000000000, "target": { "key": "f9aaf489bde41584443280ae76675aa736901c760075fc1be516930358f631d1" } }, { "amount": 600000000000, "target": { "key": "929de0f35f2d7d23e2be3a2141cbccf987952d274bf6ea54ffd37d6f7f71ec6c" } }, { "amount": 1000000000000, "target": { "key": "020f196642ea89d0e1b5f81419d154670c55ec4a987a2256cfe727b54d1cc32e" } }, { "amount": 8000000000000, "target": { "key": "4f5b487c406b26c06648e45ae3859090fdd3e1d289c82ccd03e7c18bf700e263" } } ], "extra": [ 2, 33, 0, 32, 140, 224, 45, 136, 109, 20, 79, 152, 234, 74, 249, 132, 94, 166, 130, 52, 124, 55, 44, 1, 149, 207, 228, 1, 81, 119, 112, 92, 116, 197, 161, 1, 82, 6, 60, 50, 198, 133, 86, 196, 137, 158, 179, 111, 20, 203, 103, 182, 146, 137, 27, 239, 235, 89, 63, 129, 173, 169, 148, 241, 163, 118, 32, 27 ], "signatures": [ "e54c7efb85d82fe8ef2f7ce57f50b3951323f35a8992fe931d76f03aae80d40d68ec72a372b43323d6517a66bbd4d4aa242346b475e25973675753560013080c5a4e217fe5deca02d71400887ef98edb3a496047b8edaa4c8c7621237c5ca600dc2390b6f24bd63732c86dc2cc1ffa0e533dc6bfe870939236174c18acd2860c", "0a71e76bf7c4cc6d28dd250143424f95506a49400f9a738c2b451d7a1d96820fa18bdfa4fad5b269da1ceb2f7d4934b201301a3c432e84df7bd36107c99fc200f1b51aaae7bf10eccc7f497966f90316b2d77449c07df85e4c31103525ad760d354b9c173e9b420ef886c2417161fa64f308e2f395ea3d271bab3d37aedc2300"] }


Less details
source code | moneroexplorer