Monero Transaction 707ef792906f6cee235d126b6c21645d19a80a43308d06c71781ea8400e9b26d

Autorefresh is OFF

Tx hash: 707ef792906f6cee235d126b6c21645d19a80a43308d06c71781ea8400e9b26d

Tx prefix hash: 72044bc9ba076dde65133870bb36d5bfc7ac25b203b04afbc3e6c8fb2e962f55
Tx public key: b93f9d87109b39c33249844cc8fba471336161f7d1b169e16c9bfc0aee8dfd9b

Transaction 707ef792906f6cee235d126b6c21645d19a80a43308d06c71781ea8400e9b26d was carried out on the Monero network on 2014-07-03 14:08:48. The transaction has 3130016 confirmations. Total output fee is 0.005953898047 XMR.

Timestamp: 1404396528 Timestamp [UTC]: 2014-07-03 14:08:48 Age [y:d:h:m:s]: 10:083:08:55:00
Block: 112629 Fee (per_kB): 0.005953898047 (0.016301581819) Tx size: 0.3652 kB
Tx version: 1 No of confirmations: 3130016 RingCT/type: no
Extra: 01b93f9d87109b39c33249844cc8fba471336161f7d1b169e16c9bfc0aee8dfd9b

6 output(s) for total of 0.194046101953 xmr

stealth address amount amount idx tag
00: 7040cdad32361e659f461d6483f40a388f1eb233de7e7910b5ec8d368943a22a 0.000046101953 0 of 1 -
01: f1dc1bfdaf0bc42bb03b44fe9a25faa9ce575329020c93428527467b55d86a9c 0.006000000000 167715 of 256624 -
02: 9fd62a7c4eb0e8a141f98ec673d0e727b6f28898c5563662c15351ba639e2931 0.008000000000 152030 of 245067 -
03: c34d171d41b4875dcb8b868d35573396b9428a0f9fee412983c90f3ad7479fd2 0.010000000000 309808 of 502466 -
04: 88b25c760499d0c21932a9c75d6267addc4d8a510e62145204d0b4ec46e9c2bc 0.070000000000 79643 of 263947 -
05: 523cf8d4c944ada3b9dc0450c04f85c299cbca7a8ef9928b9a8cc221301e4f63 0.100000000000 223412 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-01 21:59:54 till 2014-07-01 23:59:54; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.200000000000 xmr

key image 00: 6bb17cd9a31dcf8f4d41a80ff32c81358c6359463b76590d4e5ca18a744f41a8 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9dd5cab9634ae7bf359dc2b16ee46d10035cbbe224a0565320dc656807691665 00110291 1 2/5 2014-07-01 22:59:54 10:085:00:03:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 126084 ], "k_image": "6bb17cd9a31dcf8f4d41a80ff32c81358c6359463b76590d4e5ca18a744f41a8" } } ], "vout": [ { "amount": 46101953, "target": { "key": "7040cdad32361e659f461d6483f40a388f1eb233de7e7910b5ec8d368943a22a" } }, { "amount": 6000000000, "target": { "key": "f1dc1bfdaf0bc42bb03b44fe9a25faa9ce575329020c93428527467b55d86a9c" } }, { "amount": 8000000000, "target": { "key": "9fd62a7c4eb0e8a141f98ec673d0e727b6f28898c5563662c15351ba639e2931" } }, { "amount": 10000000000, "target": { "key": "c34d171d41b4875dcb8b868d35573396b9428a0f9fee412983c90f3ad7479fd2" } }, { "amount": 70000000000, "target": { "key": "88b25c760499d0c21932a9c75d6267addc4d8a510e62145204d0b4ec46e9c2bc" } }, { "amount": 100000000000, "target": { "key": "523cf8d4c944ada3b9dc0450c04f85c299cbca7a8ef9928b9a8cc221301e4f63" } } ], "extra": [ 1, 185, 63, 157, 135, 16, 155, 57, 195, 50, 73, 132, 76, 200, 251, 164, 113, 51, 97, 97, 247, 209, 177, 105, 225, 108, 155, 252, 10, 238, 141, 253, 155 ], "signatures": [ "3ebc9db87db5faf80eea53b04f8691957dcd98ae1d0ce4f0d286549f410efe0d8f8fd704cb5a6494d611329ff3fc6dd1dcd9769a77ba4d77a0d8c36f95af3a0e"] }


Less details
source code | moneroexplorer