Monero Transaction aa661d2df8e444e49b88e789912c233e93365a58dce7f5ddc830df2cbcc1b95c

Autorefresh is OFF

Tx hash: aa661d2df8e444e49b88e789912c233e93365a58dce7f5ddc830df2cbcc1b95c

Tx prefix hash: ce642b8ff5dc2ebc9eaf3d2426854e26e3ab407bb43a57ef6e5d540704f3464a
Tx public key: 996856ebf2d23c426cfe3ba2353c123bbc4db4175a06bb03d635383578f13ecf
Payment id: 5c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088

Transaction aa661d2df8e444e49b88e789912c233e93365a58dce7f5ddc830df2cbcc1b95c was carried out on the Monero network on 2014-07-22 08:43:54. The transaction has 3138726 confirmations. Total output fee is 0.009620960000 XMR.

Timestamp: 1406018634 Timestamp [UTC]: 2014-07-22 08:43:54 Age [y:d:h:m:s]: 10:114:06:14:19
Block: 139672 Fee (per_kB): 0.009620960000 (0.014216252583) Tx size: 0.6768 kB
Tx version: 1 No of confirmations: 3138726 RingCT/type: no
Extra: 0221005c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb908801996856ebf2d23c426cfe3ba2353c123bbc4db4175a06bb03d635383578f13ecf

7 output(s) for total of 10.020379040000 xmr

stealth address amount amount idx tag
00: 1a99b89284f0d87e0d20f36a911db40c6843e83292302bf47f868b9b3b2fcd79 0.000379040000 0 of 3 -
01: 56cad112e6ae43cbf8642044db4a3dad441e20da20ffc852eabe76d80dde8b4c 0.060000000000 94553 of 264760 -
02: b78ce8cd0dc2269d8f75739d2d50ae840946a69ba02cea6cd4fe33f44f3803aa 0.060000000000 94554 of 264760 -
03: 01c4d055573d24037206cf04de0bef9d08fd4fb432e457d2447c2f6657f923c3 0.200000000000 238123 of 1272210 -
04: d4db21c594bb1ffcb9b1e69b5b00d862f3463012baf548f56fec8267f9b9def1 0.700000000000 76244 of 514466 -
05: f9840f2fb80aa2850a90cb37f570fad3fa4faa01ee49d989a2b8851d48cdd89d 3.000000000000 32114 of 300495 -
06: 01071eea7391c9f2a3e3d99786df9d84ef8b04bfbaa890308ab108278c086ce0 6.000000000000 70669 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-21 14:59:51 till 2014-07-22 08:43:50; resolution: 0.54 days)

  • |_____________________________________________________________________________________*___________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 10.030000000000 xmr

key image 00: c3118df1e22eb72b09cb2a3ae72980a90a1d4570a957b7722303acb9be76f6c6 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0c6df9204cc1f25a96241c7ec13f6ff8bd9ae217c41a829fc58ba8ca9875131a 00073289 1 2/46 2014-06-06 11:46:51 10:160:03:11:22
- 01: a05ea282c8fa5cb060276f09a9a945bd96d90216661f0dd724e309463444cec1 00139605 0 0/5 2014-07-22 07:43:50 10:114:07:14:23
key image 01: f4356b871c92a99176285dd71b3788f9b4cf501e9237bf12caacc68f175268c1 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8b8d7aed8240a19b1cb7d35f19f9571fa9ebdede0a009e18b3a25864a0e0dced 00004867 0 0/8 2014-04-21 15:59:51 10:205:22:58:22
- 01: cfbeda9b7fc89bed9f5d0f0e3bf749e7dd1be2800f93e4bb910448c5d6729893 00139599 0 0/5 2014-07-22 07:39:12 10:114:07:19:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 46049, 104526 ], "k_image": "c3118df1e22eb72b09cb2a3ae72980a90a1d4570a957b7722303acb9be76f6c6" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 4873, 154003 ], "k_image": "f4356b871c92a99176285dd71b3788f9b4cf501e9237bf12caacc68f175268c1" } } ], "vout": [ { "amount": 379040000, "target": { "key": "1a99b89284f0d87e0d20f36a911db40c6843e83292302bf47f868b9b3b2fcd79" } }, { "amount": 60000000000, "target": { "key": "56cad112e6ae43cbf8642044db4a3dad441e20da20ffc852eabe76d80dde8b4c" } }, { "amount": 60000000000, "target": { "key": "b78ce8cd0dc2269d8f75739d2d50ae840946a69ba02cea6cd4fe33f44f3803aa" } }, { "amount": 200000000000, "target": { "key": "01c4d055573d24037206cf04de0bef9d08fd4fb432e457d2447c2f6657f923c3" } }, { "amount": 700000000000, "target": { "key": "d4db21c594bb1ffcb9b1e69b5b00d862f3463012baf548f56fec8267f9b9def1" } }, { "amount": 3000000000000, "target": { "key": "f9840f2fb80aa2850a90cb37f570fad3fa4faa01ee49d989a2b8851d48cdd89d" } }, { "amount": 6000000000000, "target": { "key": "01071eea7391c9f2a3e3d99786df9d84ef8b04bfbaa890308ab108278c086ce0" } } ], "extra": [ 2, 33, 0, 92, 130, 252, 227, 186, 20, 184, 186, 21, 180, 186, 68, 116, 221, 225, 104, 37, 34, 201, 14, 86, 99, 94, 171, 43, 78, 82, 14, 26, 235, 144, 136, 1, 153, 104, 86, 235, 242, 210, 60, 66, 108, 254, 59, 162, 53, 60, 18, 59, 188, 77, 180, 23, 90, 6, 187, 3, 214, 53, 56, 53, 120, 241, 62, 207 ], "signatures": [ "6240b69a530031dd85432cca45086cb4bc859318e193cd65cedd2a35b04f7a06fcf47493e248263f67431d0a496785fdd963220492c83874de0cd993a112af04dc0e8530769d757974422a2dbdc9c565b364262ca2a76eb2678b2d53f59f1004ccf006e8e0cc7725a49868e9b310f5c874943c9b8824a23fbac30c81fba8f90e", "24eb93a72ebb792c101f382127ec71c8c11a840770dec001bca86afcee0c22023ba629b907b386a195434bac9a5302db03c4d8dbf4c6825ed53f7608bae41b0c8cc38625a317ab0d6ec095c6778c2ce509ba36c23ecc36e2e757c47c0bd8b604cdf882ed02caec1fe442e34c6dbbf024f0a0cc17c0b430e2bc3a7f4ab53f7304"] }


Less details
source code | moneroexplorer