Monero Transaction b16572b9954df6f13ebf5e56d4ad9e33ede116c3a75a2e255d2d0bbfc5f7e81f

Autorefresh is OFF

Tx hash: b16572b9954df6f13ebf5e56d4ad9e33ede116c3a75a2e255d2d0bbfc5f7e81f

Tx prefix hash: e5258f7d1bf9a14bca1765306a1409e5badb5a73495ec0d320b8ec925076f675
Tx public key: 1ae016348f1f7ca37b81ea516c28f3a87bfa4d82f295ed0e7ff3a337eb08a4bb
Payment id: fa73b590e8dfa90058baa52ecccf5a412a11fcb873575b57acb11d3d7e5ba75e

Transaction b16572b9954df6f13ebf5e56d4ad9e33ede116c3a75a2e255d2d0bbfc5f7e81f was carried out on the Monero network on 2014-07-17 15:53:58. The transaction has 3145315 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405612438 Timestamp [UTC]: 2014-07-17 15:53:58 Age [y:d:h:m:s]: 10:118:17:28:31
Block: 132921 Fee (per_kB): 0.010000000000 (0.011544532131) Tx size: 0.8662 kB
Tx version: 1 No of confirmations: 3145315 RingCT/type: no
Extra: 022100fa73b590e8dfa90058baa52ecccf5a412a11fcb873575b57acb11d3d7e5ba75e011ae016348f1f7ca37b81ea516c28f3a87bfa4d82f295ed0e7ff3a337eb08a4bb

7 output(s) for total of 495.300000000000 xmr

stealth address amount amount idx tag
00: c72367e8127d349403e7d104e7ea5e984c9e4ec1e24cf02e329ec7c00722fb1e 0.300000000000 104550 of 976536 -
01: cbc1ace0b032e917c383e423fba50627efcab6b904723fa8cf0405b18824b995 7.000000000000 45124 of 285521 -
02: 767a7afea5b74b8c297049a3ad45783346cb31c950dd7b2778c57def6fb86012 8.000000000000 9414 of 226902 -
03: f6021f1b3357350d8c01dc42111c83176d3dc932a2448bb81da253a9afbda2b1 90.000000000000 2103 of 36286 -
04: 9d431d761c42e1fc377d56fb8312d5061cb912aa9b8c46b4533fa3db1113aadc 90.000000000000 2104 of 36286 -
05: 7e6ba074fa55b2eb11237ce7e5df50d07907d6a0224d1d554152064a5af8eff5 100.000000000000 3543 of 57197 -
06: 7fa9607a211d616a4ec2617d59516f343e066421b1b5c190a66a754d990c1bd2 200.000000000000 1769 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-14 08:15:15 till 2014-07-14 13:40:48; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________________________________________*_______________________________|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|
  • |________________________________*_________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|

5 inputs(s) for total of 495.310000000000 xmr

key image 00: d768738b0137baaed093cccd15f2a4f09c3b75f6afc094f3f1b2f0cebe8b91d6 amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7a524cb94496687bf54766e81be2ac918fb8bbe451444ddd23ef44f17c852512 00128313 1 5/10 2014-07-14 12:40:48 10:121:20:41:41
key image 01: e968fbd4b79e65532ab9a5b4ca0fb514918e195fd61891cb1e53d30d5156ab17 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a38fff59ecd65d02faf4cecfa85b6d69ff71af90a332605caed0afa81e11adc8 00128313 1 5/10 2014-07-14 12:40:48 10:121:20:41:41
key image 02: 0afa70a0f3e62f08c682da51ebf43fdfaa27bab10e4521eb8839de82331d2837 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d83dbe106328429aa401c9bc8a60fb561dd50fa06a3730fa00373a49864939a5 00128313 1 5/10 2014-07-14 12:40:48 10:121:20:41:41
key image 03: 7f53f0af13a2a04e712cb97771d0fa7f33da038a1a435ed118ee61a4dc527575 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 42150fb7f5d2842b0ddea0ef3e8e36b5acff8360db323c90f78d903bbc60c88e 00128104 1 3/10 2014-07-14 09:15:15 10:122:00:07:14
key image 04: 0cfa677242e822f35e37be4e74e7e28a0c9ff14c0a9cf90fd36fda63b531a9b9 amount: 400.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5a0fb828fcd100ab7de09a065d0606590dbfcb9ec0945c3760e5f353a63e26e6 00128313 1 5/10 2014-07-14 12:40:48 10:121:20:41:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000000, "key_offsets": [ 1925 ], "k_image": "d768738b0137baaed093cccd15f2a4f09c3b75f6afc094f3f1b2f0cebe8b91d6" } }, { "key": { "amount": 300000000000, "key_offsets": [ 99528 ], "k_image": "e968fbd4b79e65532ab9a5b4ca0fb514918e195fd61891cb1e53d30d5156ab17" } }, { "key": { "amount": 10000000000, "key_offsets": [ 313294 ], "k_image": "0afa70a0f3e62f08c682da51ebf43fdfaa27bab10e4521eb8839de82331d2837" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 51661 ], "k_image": "7f53f0af13a2a04e712cb97771d0fa7f33da038a1a435ed118ee61a4dc527575" } }, { "key": { "amount": 400000000000000, "key_offsets": [ 571 ], "k_image": "0cfa677242e822f35e37be4e74e7e28a0c9ff14c0a9cf90fd36fda63b531a9b9" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "c72367e8127d349403e7d104e7ea5e984c9e4ec1e24cf02e329ec7c00722fb1e" } }, { "amount": 7000000000000, "target": { "key": "cbc1ace0b032e917c383e423fba50627efcab6b904723fa8cf0405b18824b995" } }, { "amount": 8000000000000, "target": { "key": "767a7afea5b74b8c297049a3ad45783346cb31c950dd7b2778c57def6fb86012" } }, { "amount": 90000000000000, "target": { "key": "f6021f1b3357350d8c01dc42111c83176d3dc932a2448bb81da253a9afbda2b1" } }, { "amount": 90000000000000, "target": { "key": "9d431d761c42e1fc377d56fb8312d5061cb912aa9b8c46b4533fa3db1113aadc" } }, { "amount": 100000000000000, "target": { "key": "7e6ba074fa55b2eb11237ce7e5df50d07907d6a0224d1d554152064a5af8eff5" } }, { "amount": 200000000000000, "target": { "key": "7fa9607a211d616a4ec2617d59516f343e066421b1b5c190a66a754d990c1bd2" } } ], "extra": [ 2, 33, 0, 250, 115, 181, 144, 232, 223, 169, 0, 88, 186, 165, 46, 204, 207, 90, 65, 42, 17, 252, 184, 115, 87, 91, 87, 172, 177, 29, 61, 126, 91, 167, 94, 1, 26, 224, 22, 52, 143, 31, 124, 163, 123, 129, 234, 81, 108, 40, 243, 168, 123, 250, 77, 130, 242, 149, 237, 14, 127, 243, 163, 55, 235, 8, 164, 187 ], "signatures": [ "39be8b9c3212ef96d2b46eae925df2f4f22ac6a1a53dd2c7a1a6ac6b3a214f088e390cd686e9de59a6bbb05a637b805dc90d6e991081441a92d821506ac9d70a", "b2f3b92894847c818b5351817add51b93f559449e49190f331404a8f4b94c60487397267d8f59fedaceee85caf3bf53d1abdbab652118c11f568ff1de32d880f", "babebd4720e403cd2a153919b9caf41aaa319a97fc89d39dd3df4e3fbb56160e8f64c6cf63b547e4fd2d33f3682393a3d54e23bf60e7d4ead58db7643ed55e0d", "e3a749dd8d6aac5db0c72d81c9ca8aceb8e3828a19566d9de2ce8b306dcea3086c3761bce72275e70cb2d5db0aed308749c6b74043e96128a83b0485bbe35d0f", "c5cb50536f985b854d0d6da6f579b73c3c87ffd772d38e137996657deb1318099c2860bac752774f769ccc06baa1f6502453cc155c4f7698d89537963d7f7608"] }


Less details
source code | moneroexplorer