Monero Transaction b1b26c34ccb0230fd20770a41622259de9a7eaeb6b5396216b994d7af5c5d03a

Autorefresh is OFF

Tx hash: b1b26c34ccb0230fd20770a41622259de9a7eaeb6b5396216b994d7af5c5d03a

Tx prefix hash: f948a905c10f467d8b017f4afca121e7043d350180e1f6026d9707a70601c317
Tx public key: a6a56525e0ec7d26d0d834dc5a3d5830a9db8b905d30345eda9835b26e09b2bd

Transaction b1b26c34ccb0230fd20770a41622259de9a7eaeb6b5396216b994d7af5c5d03a was carried out on the Monero network on 2014-07-08 22:52:48. The transaction has 3121430 confirmations. Total output fee is 0.006299419639 XMR.

Timestamp: 1404859968 Timestamp [UTC]: 2014-07-08 22:52:48 Age [y:d:h:m:s]: 10:076:17:50:27
Block: 120303 Fee (per_kB): 0.006299419639 (0.016975278185) Tx size: 0.3711 kB
Tx version: 1 No of confirmations: 3121430 RingCT/type: no
Extra: 01a6a56525e0ec7d26d0d834dc5a3d5830a9db8b905d30345eda9835b26e09b2bd

6 output(s) for total of 19.993700580361 xmr

stealth address amount amount idx tag
00: a5061942fd570d41cfad5d8727505b604bed72a3b5e934d5fe9bc409f7c7c546 0.003700580361 0 of 1 -
01: 102668906b5fecef36e4b1dc29641922950e6528bb20e329235b494de39c4663 0.090000000000 76603 of 317822 -
02: 495835afbfceb2518514c2788057a0910e882a821436db14d25dba187797a34a 0.400000000000 73637 of 688584 -
03: 7032a23e5f22bcbe22c3c10ba4b3988238c5ddb740a1515552a8fb10859a71ee 0.500000000000 105192 of 1118624 -
04: 0981266572027e87055de29364c1951a1e8e26c4f4766984e2e1dfa1f950ae6c 9.000000000000 9789 of 274259 -
05: 79968ad6994beff2c67fe0fce34cef155c501a23669caa2f1a1ed97240a941f9 10.000000000000 134549 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-08 07:21:11 till 2014-07-08 09:21:11; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 20.000000000000 xmr

key image 00: e4ff35e89ce5646266addef927588b2333be60e0da3673101da8901d59b4ebc2 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a2a17b6fe28d63fd4378f5041936ea9545d4f4f972983398b634b3c47f216bfa 00119434 1 2/8 2014-07-08 08:21:11 10:077:08:22:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000000, "key_offsets": [ 4962 ], "k_image": "e4ff35e89ce5646266addef927588b2333be60e0da3673101da8901d59b4ebc2" } } ], "vout": [ { "amount": 3700580361, "target": { "key": "a5061942fd570d41cfad5d8727505b604bed72a3b5e934d5fe9bc409f7c7c546" } }, { "amount": 90000000000, "target": { "key": "102668906b5fecef36e4b1dc29641922950e6528bb20e329235b494de39c4663" } }, { "amount": 400000000000, "target": { "key": "495835afbfceb2518514c2788057a0910e882a821436db14d25dba187797a34a" } }, { "amount": 500000000000, "target": { "key": "7032a23e5f22bcbe22c3c10ba4b3988238c5ddb740a1515552a8fb10859a71ee" } }, { "amount": 9000000000000, "target": { "key": "0981266572027e87055de29364c1951a1e8e26c4f4766984e2e1dfa1f950ae6c" } }, { "amount": 10000000000000, "target": { "key": "79968ad6994beff2c67fe0fce34cef155c501a23669caa2f1a1ed97240a941f9" } } ], "extra": [ 1, 166, 165, 101, 37, 224, 236, 125, 38, 208, 216, 52, 220, 90, 61, 88, 48, 169, 219, 139, 144, 93, 48, 52, 94, 218, 152, 53, 178, 110, 9, 178, 189 ], "signatures": [ "57536d877e9465001ecb943cdb9c1aabed22223f5618c0dd864c83ef46558e0f63e9ef3c12fa7f88bb46a2f593af426c7b77ba53f6f0966018cce46a28bdc700"] }


Less details
source code | moneroexplorer