Monero Transaction a70fdba1f62e3d4225521d9c15c537ce29db35140ca0f0c93ccecf106f97bcff

Autorefresh is OFF

Tx hash: a70fdba1f62e3d4225521d9c15c537ce29db35140ca0f0c93ccecf106f97bcff

Tx prefix hash: 7190e84ce48b18ea5c3c84d73511c3cbd187ef55e6b7dcbc3dbc5f6a5612eb8c
Tx public key: 80aa4ec73892fffb81a66927192935aabe43f00dd36302acdf2b3e0d6027e835

Transaction a70fdba1f62e3d4225521d9c15c537ce29db35140ca0f0c93ccecf106f97bcff was carried out on the Monero network on 2014-06-23 09:21:31. The transaction has 3180558 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1403515291 Timestamp [UTC]: 2014-06-23 09:21:31 Age [y:d:h:m:s]: 10:143:07:09:09
Block: 97892 Fee (per_kB): 0.010000000000 (0.031030303030) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 3180558 RingCT/type: no
Extra: 0180aa4ec73892fffb81a66927192935aabe43f00dd36302acdf2b3e0d6027e835

2 output(s) for total of 0.190000000000 xmr

stealth address amount amount idx tag
00: d682bb4dea6c4b57affb1ef21b805158dde7d16937f8d4d1ea85e26f3f9668cf 0.090000000000 65440 of 317822 -
01: a184b718ce0e935f4f43ccb2bb1a83b6ce0ca93d7903bf19c0d38b1bef57261a 0.100000000000 150042 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-19 08:23:42 till 2014-06-21 13:45:09; resolution: 0.01 days)

  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |____*_____________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.200000000000 xmr

key image 00: 866a22b0d761ba02fda17fa42528b9e60383da91e3aedfc2e78e5ab92128c4e4 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b308ae45493d55ac766cae9a60a2095e5c1ec183e47799ad88243f9d4a8b1070 00095222 1 2/3 2014-06-21 12:45:09 10:145:03:45:31
key image 01: 727877ef84f743d3851c15b8beecd6208f02df11439067da8552faf3a385728d amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9aa1229a593e3e7f2d40f4b5f252a01e43c9d8f7c3d673e2feba19c83e242c1f 00091998 1 1/3 2014-06-19 09:23:42 10:147:07:06:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 140089 ], "k_image": "866a22b0d761ba02fda17fa42528b9e60383da91e3aedfc2e78e5ab92128c4e4" } }, { "key": { "amount": 100000000000, "key_offsets": [ 125032 ], "k_image": "727877ef84f743d3851c15b8beecd6208f02df11439067da8552faf3a385728d" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "d682bb4dea6c4b57affb1ef21b805158dde7d16937f8d4d1ea85e26f3f9668cf" } }, { "amount": 100000000000, "target": { "key": "a184b718ce0e935f4f43ccb2bb1a83b6ce0ca93d7903bf19c0d38b1bef57261a" } } ], "extra": [ 1, 128, 170, 78, 199, 56, 146, 255, 251, 129, 166, 105, 39, 25, 41, 53, 170, 190, 67, 240, 13, 211, 99, 2, 172, 223, 43, 62, 13, 96, 39, 232, 53 ], "signatures": [ "af76e553318401ce7e1b3047b23bbccc56c01ee561bb2e84df662ede8c24c00682eaca03dc62dc4b1a15481caed28af032613ac3cd0870601c28988eb7223809", "4be00f80da968e85dcbf6556bf25f680ff414b394413a96618b19ddd805a3a092b9dde19063dc9e6357c49914b237204d9a6d8f44a568668a00ddfa2e157ef0b"] }


Less details
source code | moneroexplorer