Monero Transaction b4fab2f3041e5a906a4b17a39406eb80fc495e768e11e42960a892ce925c9de5

Autorefresh is OFF

Tx hash: b4fab2f3041e5a906a4b17a39406eb80fc495e768e11e42960a892ce925c9de5

Tx prefix hash: 4b281b8ca3847575b126949f5e58a0e747bc8ee5990df87fa28c8040d4959a92
Tx public key: 2f59ff8b160dfeabd52f6b1c007954ab718732572d3f431e0b8b5c206fc5ead0

Transaction b4fab2f3041e5a906a4b17a39406eb80fc495e768e11e42960a892ce925c9de5 was carried out on the Monero network on 2016-02-04 23:52:59. The transaction has 2349537 confirmations. Total output fee is 0.026343190840 XMR.

Timestamp: 1454629979 Timestamp [UTC]: 2016-02-04 23:52:59 Age [y:d:h:m:s]: 08:300:08:31:22
Block: 942350 Fee (per_kB): 0.026343190840 (0.030829059909) Tx size: 0.8545 kB
Tx version: 1 No of confirmations: 2349537 RingCT/type: no
Extra: 012f59ff8b160dfeabd52f6b1c007954ab718732572d3f431e0b8b5c206fc5ead0

8 output(s) for total of 7.245010880000 xmr

stealth address amount amount idx tag
00: e90d2540038d657fe072495ad642dce4b2d6784f61f8d8f793a8bd59955cfd6e 0.000000080000 386 of 22809 -
01: d87ae9d95578cb186aa10e10d292ab77de46b6b2f387eab64feba694ce4d9aa9 0.000000800000 428 of 22876 -
02: 29eef3687b5457e11aa5c0390f0c627d938083340cb5343929a2b108e248d217 0.000010000000 36074 of 59775 -
03: 300a26d42046a68e456966556067372e7bf84b3f1d5f65935c3b28fc91807ae7 0.005000000000 246105 of 308585 -
04: 593b7db3d49030ce3745385135156e3c9998e9ea4c585dde817d567b404ca8e6 0.050000000000 205102 of 284521 -
05: 07d2e83c603725c5bc85d8f0701340a031eca8dbd7173fbe5aca586c65be7acd 0.090000000000 215163 of 317822 -
06: f269e8d7272d1998ff52188de99e6e7db6a43a80ae1503c3a0ef80027d6107ee 0.100000000000 851415 of 982315 -
07: 8ccad41f97651910e89ac56fd635dc1a075063a5935d1960c186dc9ca746ddd1 7.000000000000 214650 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2016-01-21 08:57:07 till 2016-02-04 09:19:44; resolution: 0.08 days)

  • |_______________________________________*__________________________________________________________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________*____________________________________________________________|
  • |____________________________________*_____________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 7.271354070840 xmr

key image 00: 2881ff441f58ae9ac62055ac00f83980f86ce351fec1e1431bb6deca26fa11a1 amount: 0.001354070840
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 45ba6c1430101d517f23e53e9022f0750948d85004b101216e7a6c398ff1fbaf 00926297 0 0/4 2016-01-24 13:38:42 08:311:18:45:39
key image 01: 65dccb6659317b0f244633fe5cedd7ef848944bd429ab3e72b18074c71458f21 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 27d6833fc7f7b6fc73a63bbcba6ab8e6ee0affa564704bdbf7e9a95d7e1bab61 00921747 7 9/8 2016-01-21 09:57:07 08:314:22:27:14
key image 02: 4df1d0e6a776d34eb459b37c44799a69d9f75f76be1bfaeebae6b818785cde61 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7872b68b8a6eba3342797bb79c924bca982f12c670b394d295e06911f5138abf 00941351 0 0/4 2016-02-04 08:19:44 08:301:00:04:37
key image 03: 5e694dfa4f8b6990879b85dd3a4de0314083d6b7a3d38ef8efef936007578278 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a60613a4a7b72682aec17ba67fb8b3818daa0510ee6b93f4c44274f31897a31b 00934432 0 0/4 2016-01-30 09:23:39 08:305:23:00:42
key image 04: 06fa26ca1db2b149b2b0563b4720877061f90368bee737c73ecf1da6fcbc4d95 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e894d58bca9ccc3baf62f31a08ff58bc729e64ea611370bfc63310efb2246ed8 00925812 0 0/4 2016-01-24 07:47:48 08:312:00:36:33
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1354070840, "key_offsets": [ 0 ], "k_image": "2881ff441f58ae9ac62055ac00f83980f86ce351fec1e1431bb6deca26fa11a1" } }, { "key": { "amount": 100000000000, "key_offsets": [ 846743 ], "k_image": "65dccb6659317b0f244633fe5cedd7ef848944bd429ab3e72b18074c71458f21" } }, { "key": { "amount": 80000000000, "key_offsets": [ 185313 ], "k_image": "4df1d0e6a776d34eb459b37c44799a69d9f75f76be1bfaeebae6b818785cde61" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 206096 ], "k_image": "5e694dfa4f8b6990879b85dd3a4de0314083d6b7a3d38ef8efef936007578278" } }, { "key": { "amount": 90000000000, "key_offsets": [ 212215 ], "k_image": "06fa26ca1db2b149b2b0563b4720877061f90368bee737c73ecf1da6fcbc4d95" } } ], "vout": [ { "amount": 80000, "target": { "key": "e90d2540038d657fe072495ad642dce4b2d6784f61f8d8f793a8bd59955cfd6e" } }, { "amount": 800000, "target": { "key": "d87ae9d95578cb186aa10e10d292ab77de46b6b2f387eab64feba694ce4d9aa9" } }, { "amount": 10000000, "target": { "key": "29eef3687b5457e11aa5c0390f0c627d938083340cb5343929a2b108e248d217" } }, { "amount": 5000000000, "target": { "key": "300a26d42046a68e456966556067372e7bf84b3f1d5f65935c3b28fc91807ae7" } }, { "amount": 50000000000, "target": { "key": "593b7db3d49030ce3745385135156e3c9998e9ea4c585dde817d567b404ca8e6" } }, { "amount": 90000000000, "target": { "key": "07d2e83c603725c5bc85d8f0701340a031eca8dbd7173fbe5aca586c65be7acd" } }, { "amount": 100000000000, "target": { "key": "f269e8d7272d1998ff52188de99e6e7db6a43a80ae1503c3a0ef80027d6107ee" } }, { "amount": 7000000000000, "target": { "key": "8ccad41f97651910e89ac56fd635dc1a075063a5935d1960c186dc9ca746ddd1" } } ], "extra": [ 1, 47, 89, 255, 139, 22, 13, 254, 171, 213, 47, 107, 28, 0, 121, 84, 171, 113, 135, 50, 87, 45, 63, 67, 30, 11, 139, 92, 32, 111, 197, 234, 208 ], "signatures": [ "917df7770cb212b777484e5bff8e27285612b510bd026ebf43482e717bf7c70fbddf28b17a00f0dd2fb35fb9cca36101968e8a0761959f5d7a2a59054038e800", "71df011b073e604d76204d12a8f6f4a3ecc93ce32430f3f98d1ef57a5d40c3003ef9364d34168dc2d84c851be7c3fbd7d071fd5e95a742a3a7a7d9f48e3a7d0d", "db9c857d1b3ef62185b3ca7a10361cf731afd4bf364c81c994d529fb97a47901b0963acdb3868d99394c2d259f172488c6e20ae00614abba8bf464a60714fa0e", "646d765b5bde545b8c5f28aee1266d25399922117439a3847084a980ef8c530bdebae1cd648d66e8733605d7df0281577ca2948ff80f7be52307ab3560717c05", "9035daa79160d7b917de077c2a299c735980543922a21e1c47c9607668785100598ac4994ccbb2070ab8173246cbccd5f767a778605685094f220c83438dcb04"] }


Less details
source code | moneroexplorer