Monero Transaction b3b712d6f243c4ee72aa191efc06bf0a1b08147f4df964f9ec57ba1f99b541b0

Autorefresh is OFF

Tx hash: b3b712d6f243c4ee72aa191efc06bf0a1b08147f4df964f9ec57ba1f99b541b0

Tx prefix hash: eedb854030ed27618b775c136ba1dc7929f52af84c7aee43b4ebda3ff6f4ea87
Tx public key: 4971202ce4cb5cce144a1573f3e2d2cca654850ada609c4986bedd16b8cf2ed3
Payment id: fa4513baa20370eb2e2f0194488c3b51e169775d02f7ec2b90d3d4220296609b

Transaction b3b712d6f243c4ee72aa191efc06bf0a1b08147f4df964f9ec57ba1f99b541b0 was carried out on the Monero network on 2015-03-13 12:14:06. The transaction has 2831254 confirmations. Total output fee is 0.153228212092 XMR.

Timestamp: 1426248846 Timestamp [UTC]: 2015-03-13 12:14:06 Age [y:d:h:m:s]: 09:283:07:39:40
Block: 474611 Fee (per_kB): 0.153228212092 (0.324185308228) Tx size: 0.4727 kB
Tx version: 1 No of confirmations: 2831254 RingCT/type: no
Extra: 022100fa4513baa20370eb2e2f0194488c3b51e169775d02f7ec2b90d3d4220296609b014971202ce4cb5cce144a1573f3e2d2cca654850ada609c4986bedd16b8cf2ed3

5 output(s) for total of 8.646771787908 xmr

stealth address amount amount idx tag
00: d9bae76709880e1e017a6ffac799e1ca0d99999b59165bc53494030fa064aeeb 0.046771787908 0 of 1 -
01: e9df72275ab0b50a1d4c3642fe0113d35f91a596245e12e5df6f030697eff11e 0.100000000000 716601 of 982315 -
02: 73c321d1d9319b86d128f6617d682325fe18fb011026420524407065ca79c3fa 0.500000000000 690900 of 1118624 -
03: b2899267aa91623ef8930607630da07fb039f4e64b6111234ac954817be822b3 3.000000000000 180409 of 300495 -
04: 45f6a1a44255bf84ac0cd4ffc0f087df92e25cf1357dbf7774fd8d8d6b2a645b 5.000000000000 150302 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-03-13 06:08:44 till 2015-03-13 11:06:33; resolution: 0.00 days)

  • |_______________________________________________________________________________________________________________________________________*__________________________________|
  • |___________________________________*______________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 8.800000000000 xmr

key image 00: 5c0ad976306106c0e09d5a0a2b0620be82bd56ffc26c01ffeb87f9bbe72039a2 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9662b4ad02607e5ba8fad86bde01c192ddba8c619a179c5b9f332d546e198b4a 00474463 1 2/4 2015-03-13 10:06:33 09:283:09:47:13
key image 01: 939ad96365225c1f384e944e5b2b8b0b4bc42e33898e0e5bce9f7148d4a49aac amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9305a065565b91db1ed1479762dbd3c2d47728fcefe1cda324e0a15b0ca80b69 00474266 1 2/7 2015-03-13 07:08:44 09:283:12:45:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 259202 ], "k_image": "5c0ad976306106c0e09d5a0a2b0620be82bd56ffc26c01ffeb87f9bbe72039a2" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 33989 ], "k_image": "939ad96365225c1f384e944e5b2b8b0b4bc42e33898e0e5bce9f7148d4a49aac" } } ], "vout": [ { "amount": 46771787908, "target": { "key": "d9bae76709880e1e017a6ffac799e1ca0d99999b59165bc53494030fa064aeeb" } }, { "amount": 100000000000, "target": { "key": "e9df72275ab0b50a1d4c3642fe0113d35f91a596245e12e5df6f030697eff11e" } }, { "amount": 500000000000, "target": { "key": "73c321d1d9319b86d128f6617d682325fe18fb011026420524407065ca79c3fa" } }, { "amount": 3000000000000, "target": { "key": "b2899267aa91623ef8930607630da07fb039f4e64b6111234ac954817be822b3" } }, { "amount": 5000000000000, "target": { "key": "45f6a1a44255bf84ac0cd4ffc0f087df92e25cf1357dbf7774fd8d8d6b2a645b" } } ], "extra": [ 2, 33, 0, 250, 69, 19, 186, 162, 3, 112, 235, 46, 47, 1, 148, 72, 140, 59, 81, 225, 105, 119, 93, 2, 247, 236, 43, 144, 211, 212, 34, 2, 150, 96, 155, 1, 73, 113, 32, 44, 228, 203, 92, 206, 20, 74, 21, 115, 243, 226, 210, 204, 166, 84, 133, 10, 218, 96, 156, 73, 134, 190, 221, 22, 184, 207, 46, 211 ], "signatures": [ "c0c3625f3dec7f1faa686aca5773fc4d2532361162df661dc0da143c310f6907fc6fc02f9e3b86e74e8f6fda632d07c597b7a434930a9b4605fb3239a0de6a00", "6dfc333ef1f447797f7ec124e670d5158da6455cec3419c2eb9e07f4c915bb003e3945d69150a6b80c42a36508f9e4cccf007171ad71e8618cea6009d567b706"] }


Less details
source code | moneroexplorer