Monero Transaction 70ba9f662c8a7d3ae70c72acde374a6ae83338c74233513e64e0bad3d90c2498

Autorefresh is OFF

Tx hash: 70ba9f662c8a7d3ae70c72acde374a6ae83338c74233513e64e0bad3d90c2498

Tx prefix hash: 267a84f7baa30ccc4db9bddabeb125996f5fd3f646b9f13ec3b0c8e81b5ea69b
Tx public key: 0adcad6af8ad2dfdd4501d21cc188ebd059f11e98e3d8e97155a328af56f2870
Payment id: f6d774b39050b44974e268c2912e5a75456ce0fa01622f84a0b740500e072e91

Transaction 70ba9f662c8a7d3ae70c72acde374a6ae83338c74233513e64e0bad3d90c2498 was carried out on the Monero network on 2014-11-21 12:23:17. The transaction has 2994053 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1416572597 Timestamp [UTC]: 2014-11-21 12:23:17 Age [y:d:h:m:s]: 10:034:04:37:45
Block: 314644 Fee (per_kB): 0.010000000000 (0.011203501094) Tx size: 0.8926 kB
Tx version: 1 No of confirmations: 2994053 RingCT/type: no
Extra: 022100f6d774b39050b44974e268c2912e5a75456ce0fa01622f84a0b740500e072e91010adcad6af8ad2dfdd4501d21cc188ebd059f11e98e3d8e97155a328af56f2870

5 output(s) for total of 20.800000000000 xmr

stealth address amount amount idx tag
00: b2b0f88a941392fe2b8ed11556df2e6e9f1ec211e40363f81c926243e5d99206 0.200000000000 631384 of 1272211 -
01: 7353470452e91386d85889c460a3da5208ab47eab4ebff532adb4aaa32c33b13 0.600000000000 283142 of 650760 -
02: 62c9565d4bf1f6b601da334616377b5685354429d6a575bcd02e62ca36f9a442 5.000000000000 125642 of 255089 -
03: be0d5e24b728eca03caa800948bbc610c1f70cb5e00289bd625b7c9972994eec 5.000000000000 125643 of 255089 -
04: 29cf6a5b9aff7c84640b8485a551454e8f3d6bfa7481fb722aac838088b27459 10.000000000000 365635 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-21 09:19:04 till 2014-11-21 12:34:29; resolution: 0.00 days)

  • |______________________________________________________________________________________________________________________*___________________________________________________|
  • |__________________________________________________________________________*_______________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________*___________________________________________________|
  • |__________________________________________________________________________*_______________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________*___________________________________________________|
  • |____________________________________________________*_____________________________________________________________________________________________________________________|

6 inputs(s) for total of 20.810000000000 xmr

key image 00: 208f35bb8bd2c411316f5018bbd438158134bbbcf15e46c910edaad5d72ef42f amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 953ce115180bc6eda86fe17c3997e9fb624e93e7d46ff9272fbfd10621969fda 00314583 1 1/6 2014-11-21 11:34:29 10:034:05:26:33
key image 01: cdbe9be2b28cc6039f2b322fba7343eccfd4436b1c7464aa48f1c96f6ff1aaeb amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e8ea23de59ff7e0fe0f8197b58f1b6e5ccafd12db9d135aa50dc9eb154ce77ae 00314531 1 2/2 2014-11-21 10:43:31 10:034:06:17:31
key image 02: 55488aae7a47f2a774f7568493cfb8456c8578583c71008da5e3e386f4654131 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 41a2363b56021b354e677296c57da989a9ad91f622b084af50f47e7ba2d6431b 00314583 1 3/5 2014-11-21 11:34:29 10:034:05:26:33
key image 03: d49694ec43784eedcab0898b6e8592eaaed306099a27b786f9cc5a693464925b amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b75a9de4b6baf82c2d9283895b9bcdad412e4f74a1b403ec127adf5b67d9b24d 00314531 1 3/4 2014-11-21 10:43:31 10:034:06:17:31
key image 04: 03755528507fbf6202507e97f876878f7c4f9d9ff6c00c25c86a9335cc2b93d3 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5a39777a7dc6fbb61c39692c72ccead1c23b4fe0f5f4382784520296f41e8271 00314583 1 4/4 2014-11-21 11:34:29 10:034:05:26:33
key image 05: f3d808ccf53352b7da6008c4c4963967e406f8db3fcd4c5af8bb262fd36875d5 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 203ac74abc9fbc4fa51aad8dd3abe40ff29c19e2e79e09f34928bbdf3132ad64 00314486 1 4/52 2014-11-21 10:19:04 10:034:06:41:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000, "key_offsets": [ 123370 ], "k_image": "208f35bb8bd2c411316f5018bbd438158134bbbcf15e46c910edaad5d72ef42f" } }, { "key": { "amount": 90000000000, "key_offsets": [ 123365 ], "k_image": "cdbe9be2b28cc6039f2b322fba7343eccfd4436b1c7464aa48f1c96f6ff1aaeb" } }, { "key": { "amount": 50000000000, "key_offsets": [ 131314 ], "k_image": "55488aae7a47f2a774f7568493cfb8456c8578583c71008da5e3e386f4654131" } }, { "key": { "amount": 500000000000, "key_offsets": [ 471673 ], "k_image": "d49694ec43784eedcab0898b6e8592eaaed306099a27b786f9cc5a693464925b" } }, { "key": { "amount": 80000000000, "key_offsets": [ 104694 ], "k_image": "03755528507fbf6202507e97f876878f7c4f9d9ff6c00c25c86a9335cc2b93d3" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 21311 ], "k_image": "f3d808ccf53352b7da6008c4c4963967e406f8db3fcd4c5af8bb262fd36875d5" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "b2b0f88a941392fe2b8ed11556df2e6e9f1ec211e40363f81c926243e5d99206" } }, { "amount": 600000000000, "target": { "key": "7353470452e91386d85889c460a3da5208ab47eab4ebff532adb4aaa32c33b13" } }, { "amount": 5000000000000, "target": { "key": "62c9565d4bf1f6b601da334616377b5685354429d6a575bcd02e62ca36f9a442" } }, { "amount": 5000000000000, "target": { "key": "be0d5e24b728eca03caa800948bbc610c1f70cb5e00289bd625b7c9972994eec" } }, { "amount": 10000000000000, "target": { "key": "29cf6a5b9aff7c84640b8485a551454e8f3d6bfa7481fb722aac838088b27459" } } ], "extra": [ 2, 33, 0, 246, 215, 116, 179, 144, 80, 180, 73, 116, 226, 104, 194, 145, 46, 90, 117, 69, 108, 224, 250, 1, 98, 47, 132, 160, 183, 64, 80, 14, 7, 46, 145, 1, 10, 220, 173, 106, 248, 173, 45, 253, 212, 80, 29, 33, 204, 24, 142, 189, 5, 159, 17, 233, 142, 61, 142, 151, 21, 90, 50, 138, 245, 111, 40, 112 ], "signatures": [ "dda020298f155fcc9a6fa6bce5309e04f028e75c1b91f2a49d8eae1d8f98d00452bedac54246c5eaae7c0e21d1888686fb33afd5387ac70467318695dc42790a", "8c9f01f55ccfc0cd08b83812f4cd5bd30a00ec7abadc832e5aac4d8141a6cc07ace934661bbba63207026f8c9aeb586039544d22a90cfa882ef04031a5ef6301", "da893e3fd7c7cdc302bc9d745d0a853dd035911f2534641d57d0f9915c9b3a09f4da6e0b6ad33c8a621e019d5072bf8cb982a9c4185977e2d4360d637b38ed0b", "ec95c6116913a15ff4235663bd8a60f4c19778e938da4da4dc635fa3cb529f0485ac738e9539482655181ddb9679fbeb978120f3227bdc524e37fd08391d6c0c", "10f5aacebb0965fb0914c7061c50bb6a0cbe12f8334955c2fd3e6cad06458b0d7e4783b82b1516e2fe5d19b7629113ccbfa716c7870f769ff88ca9e5f045c606", "c884e1e5c3ddf988d77eadb6dfc2ae6d10716b7d3a573e9b8bb94aa31cab2400a586719d601e1f04c8b6ad4cd87d9e5cb7afd054dcbea4f6a805f0473ddb6d03"] }


Less details
source code | moneroexplorer