Monero Transaction b64178c23b40031374ec5da937f7ace6ed1618edfadb041d9c8ec5cc6128b8d7

Autorefresh is OFF

Tx hash: b64178c23b40031374ec5da937f7ace6ed1618edfadb041d9c8ec5cc6128b8d7

Tx prefix hash: 9b1bf9de0ed8988105facd45b6721426faab51de87664e7f4abc4c8771b4e2f1
Tx public key: 1fcc28c2c4a55db20eed59055e730c5e3f694acbac5e9ac59dfa6042249358c5
Payment id: 44ab5d858a392618c2b0d7fea033aa2fbe9baef48a462918322c90f22ef0b50d

Transaction b64178c23b40031374ec5da937f7ace6ed1618edfadb041d9c8ec5cc6128b8d7 was carried out on the Monero network on 2014-07-30 00:18:52. The transaction has 3127462 confirmations. Total output fee is 0.005554440000 XMR.

Timestamp: 1406679532 Timestamp [UTC]: 2014-07-30 00:18:52 Age [y:d:h:m:s]: 10:106:07:02:04
Block: 150710 Fee (per_kB): 0.005554440000 (0.006031544602) Tx size: 0.9209 kB
Tx version: 1 No of confirmations: 3127462 RingCT/type: no
Extra: 02210044ab5d858a392618c2b0d7fea033aa2fbe9baef48a462918322c90f22ef0b50d011fcc28c2c4a55db20eed59055e730c5e3f694acbac5e9ac59dfa6042249358c5

9 output(s) for total of 8.154445560000 xmr

stealth address amount amount idx tag
00: df27bbd979d25cfa694f2888a50b45dd81dfe3ecc81f4c21f35bea3459f75791 0.000445560000 0 of 1 -
01: e427e18ea8238b905ab894f183d3df6d6413d76da3f4d379a9f4d977f3b9240a 0.005000000000 198076 of 308584 -
02: 68ef21115c3b023467cc16e36bf3d2b9c22ffc1e856b8b3d8a3d9afd43d77787 0.009000000000 154464 of 233398 -
03: 921c441e38261e7d70d4b6ac2860336edba9b75485d0e1931488b8692fdae84e 0.050000000000 111069 of 284521 -
04: a5d2d7a947d18f387a5a3d5e57c2a8742e81e7480c51b93badc7ad44b70985b9 0.090000000000 93131 of 317822 -
05: dccd02cfc2128e44b42339b44cd9e86d08e0744a04549ce11482621990d40bae 0.300000000000 133887 of 976536 -
06: e5665453a7da77378ce2897b88a9b79cfefc7f20e7c543daaa48e659ed07dd16 0.700000000000 87370 of 514466 -
07: 9699272d0940b3faa34264bbe924160a992bb8433123681334f4d8c80e70cbff 1.000000000000 148392 of 874629 -
08: 5a4163368d0c16c00088940982b1089b4d74bd9ce004f8eb26b3c2f96e33e6ca 6.000000000000 72401 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 14:58:53 till 2014-07-30 00:57:19; resolution: 0.33 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |______________________________*__________________________________________________________________________________________________________________________________________*|
  • |_________________*_______________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 8.160000000000 xmr

key image 00: 7523b6f313e22eeb089ce28f817aaaaca1d9bfcf721f40e0c32ff08b23594466 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dbcd621cdcf11ebba639b5ee64187a664f7ac0da50571be1610957355b9ee443 00070634 1 6/128 2014-06-04 15:58:53 10:161:15:22:03
- 01: 51b605d544781255194360963957152c517ec964cc538797b9ed7033baa1edbf 00150677 2 4/6 2014-07-29 23:47:01 10:106:07:33:55
key image 01: 0fb91ddb408c2e254e197f822dab49cce40b7a48399e1a559be2c1fde8cfe6c5 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 37846689b40b3547366ccc5c7286b003c4e01450852af5157e3a77d1497b8411 00084388 1 4/89 2014-06-14 04:13:21 10:152:03:07:35
- 01: e87f7219b0eec04ffd3e254280d8cd5468933c4b416f99f6f84eae17985ffd75 00150694 2 5/6 2014-07-29 23:57:19 10:106:07:23:37
key image 02: 886562d0c28b1806e07be7dfb144208da087b30af98f4ef31558035f3c03054b amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9b8c5b859213c29d718babd8f0dfe38278d32b7c73c9485ec1108e25b09c784b 00078346 1 81/6 2014-06-10 01:25:02 10:156:05:55:54
- 01: eb8f0b94c94ad1cda8b0826b5b90a635e09b4d68b6f3459ad32e0d68acb71f63 00150673 2 1/6 2014-07-29 23:37:42 10:106:07:43:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 35346, 302297 ], "k_image": "7523b6f313e22eeb089ce28f817aaaaca1d9bfcf721f40e0c32ff08b23594466" } }, { "key": { "amount": 60000000000, "key_offsets": [ 55603, 41966 ], "k_image": "0fb91ddb408c2e254e197f822dab49cce40b7a48399e1a559be2c1fde8cfe6c5" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 2873, 8756 ], "k_image": "886562d0c28b1806e07be7dfb144208da087b30af98f4ef31558035f3c03054b" } } ], "vout": [ { "amount": 445560000, "target": { "key": "df27bbd979d25cfa694f2888a50b45dd81dfe3ecc81f4c21f35bea3459f75791" } }, { "amount": 5000000000, "target": { "key": "e427e18ea8238b905ab894f183d3df6d6413d76da3f4d379a9f4d977f3b9240a" } }, { "amount": 9000000000, "target": { "key": "68ef21115c3b023467cc16e36bf3d2b9c22ffc1e856b8b3d8a3d9afd43d77787" } }, { "amount": 50000000000, "target": { "key": "921c441e38261e7d70d4b6ac2860336edba9b75485d0e1931488b8692fdae84e" } }, { "amount": 90000000000, "target": { "key": "a5d2d7a947d18f387a5a3d5e57c2a8742e81e7480c51b93badc7ad44b70985b9" } }, { "amount": 300000000000, "target": { "key": "dccd02cfc2128e44b42339b44cd9e86d08e0744a04549ce11482621990d40bae" } }, { "amount": 700000000000, "target": { "key": "e5665453a7da77378ce2897b88a9b79cfefc7f20e7c543daaa48e659ed07dd16" } }, { "amount": 1000000000000, "target": { "key": "9699272d0940b3faa34264bbe924160a992bb8433123681334f4d8c80e70cbff" } }, { "amount": 6000000000000, "target": { "key": "5a4163368d0c16c00088940982b1089b4d74bd9ce004f8eb26b3c2f96e33e6ca" } } ], "extra": [ 2, 33, 0, 68, 171, 93, 133, 138, 57, 38, 24, 194, 176, 215, 254, 160, 51, 170, 47, 190, 155, 174, 244, 138, 70, 41, 24, 50, 44, 144, 242, 46, 240, 181, 13, 1, 31, 204, 40, 194, 196, 165, 93, 178, 14, 237, 89, 5, 94, 115, 12, 94, 63, 105, 74, 203, 172, 94, 154, 197, 157, 250, 96, 66, 36, 147, 88, 197 ], "signatures": [ "2c9dcbcae62c6a665981085a1f38f7097e2bc6874069deef17d8887431694702967ee57b5f2d724241a83e1b00d687043be3dea2d717c4745e33ca712828350d50bd5d162afbfb7ede57488f286548bccc404f600c3dee588f907f45f84b500b8c0b8466a7c3fa0cded40b30046410a28877c5c38e3f301d0951d71747bf9e07", "6bf8350f18e6f3091e85bbe6ac51fabe046110b4bf914555fd9d4d3224e601031af2f79aaa7c0338c9fdb12dcf4656742a45bc4eb1357b23770acb1d80148f042f53e1d48904dc0cc69b039f09482b5f81f1350177318fc11e144814466de707baede071c7a9c5648096fdd2b40e7861d34354011a95fface864f24d2a8c5103", "d5476ee0a6aa5514a7aac32269821325cfc9ca6cf4a086005dd30071333b5a05bc4c24871774327f8f8242872e22601d1d5e19ad87f7f79325d7c3a0741f400923a0c18bdd5b1c28b546a394feeee7c1ff1099e02bb99dfcdfac3c0e120e9301bfc33cd9ddb569a090e3abd6f2dd6662a502f9b99260689647117592a08afb0d"] }


Less details
source code | moneroexplorer