Monero Transaction b66d0e195d0ef282eae13bd8d89d8e494152ef005b9080bc8c4c9005f9e98531

Autorefresh is OFF

Tx hash: b66d0e195d0ef282eae13bd8d89d8e494152ef005b9080bc8c4c9005f9e98531

Tx prefix hash: 13850e27e6408d6392d9d12a0206bc9a0558d60f4e4e9992f0fc6de92a815eb2
Tx public key: d2839c074c170e01fb7dc2ca89bea90c0a39463270bd598c14c538dc479e344b

Transaction b66d0e195d0ef282eae13bd8d89d8e494152ef005b9080bc8c4c9005f9e98531 was carried out on the Monero network on 2014-06-28 15:49:54. The transaction has 3175471 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1403970594 Timestamp [UTC]: 2014-06-28 15:49:54 Age [y:d:h:m:s]: 10:141:13:29:10
Block: 105485 Fee (per_kB): 0.010000000000 (0.031124620061) Tx size: 0.3213 kB
Tx version: 1 No of confirmations: 3175471 RingCT/type: no
Extra: 01d2839c074c170e01fb7dc2ca89bea90c0a39463270bd598c14c538dc479e344b

2 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: 9197fd762cb05ce6c077ba71729aa19796e74165dbc4d450d06cd6bcaf618e72 0.100000000000 199808 of 982315 -
01: e64d78a7884692a7cadb663ecbcc436f0785ace02ba552d4884be2248f9245aa 0.900000000000 34967 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-09 16:11:04 till 2014-06-27 07:51:27; resolution: 0.10 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 1.010000000000 xmr

key image 00: 5e5d8f557c9bf44394244840a77068bf49336c62d5ecbc10a45f756a104da57a amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 254a5101191fd1fd2001a1adb550247779b06542bca3677f84e5026931091294 00077858 1 70/16 2014-06-09 17:11:04 10:160:12:08:00
key image 01: a1364a8f91a90562c58aac73b05602ec114ce3ebfb920115ba71f6af6407a2d9 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 07c729a6e170c3f1f6eea374229159df7c597e5c0517bff453123bddff7c4718 00103462 1 10/1 2014-06-27 06:51:27 10:142:22:27:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 135470 ], "k_image": "5e5d8f557c9bf44394244840a77068bf49336c62d5ecbc10a45f756a104da57a" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 50969 ], "k_image": "a1364a8f91a90562c58aac73b05602ec114ce3ebfb920115ba71f6af6407a2d9" } } ], "vout": [ { "amount": 100000000000, "target": { "key": "9197fd762cb05ce6c077ba71729aa19796e74165dbc4d450d06cd6bcaf618e72" } }, { "amount": 900000000000, "target": { "key": "e64d78a7884692a7cadb663ecbcc436f0785ace02ba552d4884be2248f9245aa" } } ], "extra": [ 1, 210, 131, 156, 7, 76, 23, 14, 1, 251, 125, 194, 202, 137, 190, 169, 12, 10, 57, 70, 50, 112, 189, 89, 140, 20, 197, 56, 220, 71, 158, 52, 75 ], "signatures": [ "41c6e82e9587a18fd78b5a3b94e47ec230e5fe22da3def3aae531c15cd8ee608137dbaa626e6aa6fff1bc12bc93fa125ced400777e27ef34f4538d6c12ce2b09", "375cd57e82201d8c687caa0d18db4c9fb995627f4dda2fca71cdce5c2f3f240525609562bd3bbbceb9558ea449b8dda0625e13f9e4e3ce196207741b3a7e650e"] }


Less details
source code | moneroexplorer