Monero Transaction 97f0fe8a002f16bd746f5c4487dfd52b511f05576f5a42338a2c4a1ea5b1be81

Autorefresh is OFF

Tx hash: 97f0fe8a002f16bd746f5c4487dfd52b511f05576f5a42338a2c4a1ea5b1be81

Tx prefix hash: 5334beaae5391557eb89ef0b6a3a9e62bd35eff150255d13fc028f3d06896a48
Tx public key: 57fd3462eefa18701845b692086a94ff5a55237a5775e5c81137d31f3d4dcee2
Payment id: 3a4badd35426e4fd800b7a3e9b141c619545b2dac2ddfc6623bc49f3b81ffc65

Transaction 97f0fe8a002f16bd746f5c4487dfd52b511f05576f5a42338a2c4a1ea5b1be81 was carried out on the Monero network on 2014-07-06 15:42:14. The transaction has 3181994 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404661334 Timestamp [UTC]: 2014-07-06 15:42:14 Age [y:d:h:m:s]: 10:158:15:24:09
Block: 117039 Fee (per_kB): 0.010000000000 (0.028209366391) Tx size: 0.3545 kB
Tx version: 1 No of confirmations: 3181994 RingCT/type: no
Extra: 0221003a4badd35426e4fd800b7a3e9b141c619545b2dac2ddfc6623bc49f3b81ffc650157fd3462eefa18701845b692086a94ff5a55237a5775e5c81137d31f3d4dcee2

2 output(s) for total of 0.810000000000 xmr

stealth address amount amount idx tag
00: 145a5d99135c98f2bdb1b052a36ceee7972784b054e0800eb9e53bf642f0e4b2 0.010000000000 310864 of 502466 -
01: 41a665c9d7fc14d053de09a584bed818aa95f060e32ff46ba5c8b238653e2097 0.800000000000 51425 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-06 05:37:21 till 2014-07-06 09:09:45; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________________________*_______________________________________________|
  • |________________________________________________*_________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.820000000000 xmr

key image 00: ad0ea62f6125ac90432e7b809314e0c60f8d98f406d3252bf772dcdf9c9ca1ef amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 666b3940a27edd32020aefea1a69242ed80109852dd40981696ce885ea9d781b 00116608 1 9/36 2014-07-06 08:09:45 10:158:22:56:38
key image 01: 3aa2d73a6ed5bdda993c867f50832f42209eb5d5d21811da8fddfacfabf0e371 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3837e3816eb2d6cc0982cd824f8e8d02936fca05d1a975ac9941a2bab1fd78e8 00116532 1 4/3 2014-07-06 06:37:21 10:159:00:29:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 50983 ], "k_image": "ad0ea62f6125ac90432e7b809314e0c60f8d98f406d3252bf772dcdf9c9ca1ef" } }, { "key": { "amount": 20000000000, "key_offsets": [ 196579 ], "k_image": "3aa2d73a6ed5bdda993c867f50832f42209eb5d5d21811da8fddfacfabf0e371" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "145a5d99135c98f2bdb1b052a36ceee7972784b054e0800eb9e53bf642f0e4b2" } }, { "amount": 800000000000, "target": { "key": "41a665c9d7fc14d053de09a584bed818aa95f060e32ff46ba5c8b238653e2097" } } ], "extra": [ 2, 33, 0, 58, 75, 173, 211, 84, 38, 228, 253, 128, 11, 122, 62, 155, 20, 28, 97, 149, 69, 178, 218, 194, 221, 252, 102, 35, 188, 73, 243, 184, 31, 252, 101, 1, 87, 253, 52, 98, 238, 250, 24, 112, 24, 69, 182, 146, 8, 106, 148, 255, 90, 85, 35, 122, 87, 117, 229, 200, 17, 55, 211, 31, 61, 77, 206, 226 ], "signatures": [ "288efce9e830e0b62115c3ea0f18315f7c7ef33371e57a4fc5fc3f17be9c280929fb8ffa830caf902ddb2b072c8ad9578d01e505dd1824fb144afc287b2c7809", "565ad18624bf9221fed880911871d28ee7a07e1023591b4a5e0f8a0fddcba00713d9d9b050be779956276d0c325c62a622009cc0c1a8d7e4dbf6dcf2c405d604"] }


Less details
source code | moneroexplorer