Monero Transaction b1fa34070c4bf44c6fe78f9aeeedad0d516e70f55c30bac059d2b9b3e91a0a16

Autorefresh is OFF

Tx hash: b1fa34070c4bf44c6fe78f9aeeedad0d516e70f55c30bac059d2b9b3e91a0a16

Tx prefix hash: c31372143b55d3dcecabf53afe548b01c00643478f613b3536068cbb2de77928
Tx public key: c46ea347e15334cdf8d6876e0f3f28e137f7c9afe595e6dbc964204102e4d535
Payment id: 12b8f025d9e24dc7a3e8f1c5272b54e8410ff43fbeb64919b726d03434b9f296

Transaction b1fa34070c4bf44c6fe78f9aeeedad0d516e70f55c30bac059d2b9b3e91a0a16 was carried out on the Monero network on 2014-09-04 04:14:19. The transaction has 3098225 confirmations. Total output fee is 0.199000000000 XMR.

Timestamp: 1409804059 Timestamp [UTC]: 2014-09-04 04:14:19 Age [y:d:h:m:s]: 10:101:15:46:36
Block: 202602 Fee (per_kB): 0.199000000000 (0.541957446809) Tx size: 0.3672 kB
Tx version: 1 No of confirmations: 3098225 RingCT/type: no
Extra: 02210012b8f025d9e24dc7a3e8f1c5272b54e8410ff43fbeb64919b726d03434b9f29601c46ea347e15334cdf8d6876e0f3f28e137f7c9afe595e6dbc964204102e4d535

5 output(s) for total of 49.801000000000 xmr

stealth address amount amount idx tag
00: 8e80628d622b068ad03f504d3664964c4c777b41fb6c28387e4be4d6101928ae 0.001000000000 46749 of 100400 -
01: ec79c46f3a1d65a31ed1ab3aa5264117d20ebe83273ce593e58ef83ff951d0f0 0.900000000000 112794 of 454894 -
02: 8623334fbc29bf61bef273f2e474bc288e47dc96e6558da8fc1399f79d63cf58 0.900000000000 112795 of 454894 -
03: 8f0038060ba3c8b1fd755e0f4218d0416e9daed7687ff71b5b582afa15eeb8ae 8.000000000000 17337 of 226902 -
04: 455a9195e629410feecf49d2b4c8a6d2fd61636816ee962666367cdb16140bcb 40.000000000000 4975 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-03 18:32:07 till 2014-09-03 20:32:07; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 50.000000000000 xmr

key image 00: 43e2b571df7f3e8913f0ff7864555c28452fe847dc401d196c925ba1a97a76dc amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 79ebfa8bc8967aa183baf3dcebba92e28edaeb9cbe19eabf381e5a762f9dd11b 00202135 1 15/5 2014-09-03 19:32:07 10:102:00:28:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000000, "key_offsets": [ 5335 ], "k_image": "43e2b571df7f3e8913f0ff7864555c28452fe847dc401d196c925ba1a97a76dc" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "8e80628d622b068ad03f504d3664964c4c777b41fb6c28387e4be4d6101928ae" } }, { "amount": 900000000000, "target": { "key": "ec79c46f3a1d65a31ed1ab3aa5264117d20ebe83273ce593e58ef83ff951d0f0" } }, { "amount": 900000000000, "target": { "key": "8623334fbc29bf61bef273f2e474bc288e47dc96e6558da8fc1399f79d63cf58" } }, { "amount": 8000000000000, "target": { "key": "8f0038060ba3c8b1fd755e0f4218d0416e9daed7687ff71b5b582afa15eeb8ae" } }, { "amount": 40000000000000, "target": { "key": "455a9195e629410feecf49d2b4c8a6d2fd61636816ee962666367cdb16140bcb" } } ], "extra": [ 2, 33, 0, 18, 184, 240, 37, 217, 226, 77, 199, 163, 232, 241, 197, 39, 43, 84, 232, 65, 15, 244, 63, 190, 182, 73, 25, 183, 38, 208, 52, 52, 185, 242, 150, 1, 196, 110, 163, 71, 225, 83, 52, 205, 248, 214, 135, 110, 15, 63, 40, 225, 55, 247, 201, 175, 229, 149, 230, 219, 201, 100, 32, 65, 2, 228, 213, 53 ], "signatures": [ "9905ac61764efb2b6075414485c4c4dda488321d9866a6c5bf234cd1c3225e07abd0a8517ad7c671d47fda2f60c055c8a4171877b26a3a5adb58d78fbb1bf400"] }


Less details
source code | moneroexplorer