Monero Transaction 72bf9e1bf8c0bd92d2e3c58d94b8b8bfc9903c714a640f8f4d32ba3f8b8d11b8

Autorefresh is OFF

Tx hash: 72bf9e1bf8c0bd92d2e3c58d94b8b8bfc9903c714a640f8f4d32ba3f8b8d11b8

Tx prefix hash: 5e21d79d17de9bc3542874a1e50965b9599dce62acaaf757605add96375d43af
Tx public key: 88df1da90d593f0233f6b8c91bd373abbbfd674cf40325932723b0be458e717a
Payment id: 03fd1378a88dd7fbbb4e9ee90c1ffdf2309e969b216cce109662a2b2aa43b072

Transaction 72bf9e1bf8c0bd92d2e3c58d94b8b8bfc9903c714a640f8f4d32ba3f8b8d11b8 was carried out on the Monero network on 2014-12-12 16:58:31. The transaction has 2949644 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1418403511 Timestamp [UTC]: 2014-12-12 16:58:31 Age [y:d:h:m:s]: 09:358:05:56:33
Block: 344860 Fee (per_kB): 0.010000000000 (0.015562310030) Tx size: 0.6426 kB
Tx version: 1 No of confirmations: 2949644 RingCT/type: no
Extra: 02210003fd1378a88dd7fbbb4e9ee90c1ffdf2309e969b216cce109662a2b2aa43b0720188df1da90d593f0233f6b8c91bd373abbbfd674cf40325932723b0be458e717a

4 output(s) for total of 6.980000000000 xmr

stealth address amount amount idx tag
00: b1762027327d7e07eed6a3e93d7a2cdf756829406cd2445677d55ee7a9b9be20 0.080000000000 106183 of 269576 -
01: 0190217f9497b3af7621c765dfd5f9841053b02a4352914a737919784310321c 0.900000000000 179556 of 454894 -
02: 05dbe0f3caddda09e6be962617c4fd7e28b3a683c7ebf611b417e76f41faf06d 1.000000000000 363972 of 874629 -
03: 187dd6a320cfe47c9edce68c71ccf71af896b4d8782969c0aa9c70f43176af39 5.000000000000 132376 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-12 08:49:02 till 2014-12-12 17:46:18; resolution: 0.00 days)

  • |___________________*______________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________*__________________|
  • |______________________________________________________________________________________________________________________________*___________________________________________|
  • |__________________________________________________________________*_______________________________________________________________________________________________________|

4 inputs(s) for total of 6.990000000000 xmr

key image 00: ae45570caa783fa63843af536330f06680af428fa0ffe28e06d0e5676245959d amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7145624231698751349ff9635127d0d473a189296293a6e72afdb9653418df40 00344377 1 5/5 2014-12-12 09:49:02 09:358:13:06:02
key image 01: 40614fab3260eead40569ff5087089a98cb17b655b84ca9a3fdb363b1d8989ab amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4545b46e0e2397fde2534b423a81a311fbe33efdd1965101dfc57d9c76983d4e 00344848 1 6/4 2014-12-12 16:46:18 09:358:06:08:46
key image 02: c81c7a3cb16622dc10b4f74e94eea90d0b91fb8cd785ad859a9fd3d959f65650 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 943023bedf346758ae248966c92b07ee55629a316cdfbf92b848657bd9673da2 00344779 1 4/56 2014-12-12 15:28:04 09:358:07:27:00
key image 03: 8b85d797cefe554d8b87a624bdfe8b03f6cc4b4371220c00258ff563d1808aa1 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 90f4c60fa1c9b493a277bad331fac50a2e9c65df535e699e52abf1fb1d4c962e 00344557 1 7/5 2014-12-12 12:16:44 09:358:10:38:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 136788 ], "k_image": "ae45570caa783fa63843af536330f06680af428fa0ffe28e06d0e5676245959d" } }, { "key": { "amount": 900000000000, "key_offsets": [ 179553 ], "k_image": "40614fab3260eead40569ff5087089a98cb17b655b84ca9a3fdb363b1d8989ab" } }, { "key": { "amount": 90000000000, "key_offsets": [ 126415 ], "k_image": "c81c7a3cb16622dc10b4f74e94eea90d0b91fb8cd785ad859a9fd3d959f65650" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 162949 ], "k_image": "8b85d797cefe554d8b87a624bdfe8b03f6cc4b4371220c00258ff563d1808aa1" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "b1762027327d7e07eed6a3e93d7a2cdf756829406cd2445677d55ee7a9b9be20" } }, { "amount": 900000000000, "target": { "key": "0190217f9497b3af7621c765dfd5f9841053b02a4352914a737919784310321c" } }, { "amount": 1000000000000, "target": { "key": "05dbe0f3caddda09e6be962617c4fd7e28b3a683c7ebf611b417e76f41faf06d" } }, { "amount": 5000000000000, "target": { "key": "187dd6a320cfe47c9edce68c71ccf71af896b4d8782969c0aa9c70f43176af39" } } ], "extra": [ 2, 33, 0, 3, 253, 19, 120, 168, 141, 215, 251, 187, 78, 158, 233, 12, 31, 253, 242, 48, 158, 150, 155, 33, 108, 206, 16, 150, 98, 162, 178, 170, 67, 176, 114, 1, 136, 223, 29, 169, 13, 89, 63, 2, 51, 246, 184, 201, 27, 211, 115, 171, 187, 253, 103, 76, 244, 3, 37, 147, 39, 35, 176, 190, 69, 142, 113, 122 ], "signatures": [ "1f5696a711ef29e0888496b89a7b146b3215dc9019f04c5120b5cb6d5873b40a8a48802b26b8eed4e05475ed28effd7a32ccd90332d2af8346ac1dca8e10640c", "7d59d95cb15f78d8892f2f45bdbdcfe4f5ce729a24f821a75039385c33c4aa014a1d49c5f5948a7a377bc108d0577c7598fe4fef4a78eeb31b3c63722ffb5c0b", "20b68d870f9bd93116a90464cf08a34706f21f7f3f0fc438111d842ac9804f0be8503c2fae5e7be5431169ad475a9f7ec99d4b298dbd2403b6514886ec78270a", "88c11e2e5a0c41520fd3fc56566e4f825a28cdd23306171e0c283889f3fc0f0592c2b0530e46839e2c82f4b108e510653a3a0237f0ffb0500a760c4283831003"] }


Less details
source code | moneroexplorer