Monero Transaction b678f4f808c3fccd418a124b60beacb44ddaa6919c6358a92632e6435cfbf0ab

Autorefresh is OFF

Tx hash: b678f4f808c3fccd418a124b60beacb44ddaa6919c6358a92632e6435cfbf0ab

Tx prefix hash: d1e8f351a9389a444e85905c166552d115ed31dbf12fad0c10c8aa2e7338f099
Tx public key: ffa1dffc7205f59834e52c328986acd78d31d86928b62f793a61b98148940aeb
Payment id: 6451abd86cf7674ba5c27733140f3862cbecee8c008bd016796b61b11770e3b8

Transaction b678f4f808c3fccd418a124b60beacb44ddaa6919c6358a92632e6435cfbf0ab was carried out on the Monero network on 2014-11-23 03:15:21. The transaction has 2979077 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1416712521 Timestamp [UTC]: 2014-11-23 03:15:21 Age [y:d:h:m:s]: 10:014:20:15:21
Block: 316848 Fee (per_kB): 0.010000000000 (0.021113402062) Tx size: 0.4736 kB
Tx version: 1 No of confirmations: 2979077 RingCT/type: no
Extra: 0221006451abd86cf7674ba5c27733140f3862cbecee8c008bd016796b61b11770e3b801ffa1dffc7205f59834e52c328986acd78d31d86928b62f793a61b98148940aeb

5 output(s) for total of 62.990000000000 xmr

stealth address amount amount idx tag
00: 31503bbc4e1c3ab041c7b1ad1487ffe6cc64f1034bd7723c1303c6080970727a 0.090000000000 123566 of 317822 -
01: 24756b4d0e16af19c6a07e019ea80ae33fbe9060f40088e96eab7de29b3a28bb 0.900000000000 163097 of 454894 -
02: 07df58fe90d83c5fc1eec87e441db9ab0a0bdb28363fc3fe2854aae9827bb45b 5.000000000000 126213 of 255089 -
03: eff56098bb793c06a13ea20dd61d15a361cc018491e33ece9c7d9edd6017985a 7.000000000000 61609 of 285521 -
04: 39fd04ddad890506babac0e4c76b8e5570c75486177b0f5e251577b903698971 50.000000000000 8935 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-22 23:57:41 till 2014-11-23 03:17:55; resolution: 0.00 days)

  • |___________________________________________________*______________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________*__________________________________________________|

2 inputs(s) for total of 63.000000000000 xmr

key image 00: cd8d8024e7855e4ebf930891d2bf45c7550ad5b6f10403c0b85867a75b458cc8 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 259f02f46a1610789c522d71b2ec4c5bb9264fe3ab1d86805c9846f8e1209ef7 00316711 0 0/3 2014-11-23 00:57:41 10:014:22:33:01
key image 01: 624d46a18a32410996e250866511048431bfcb85cdfe1bb68547a6e7b8e6476f amount: 60.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 643b7eee5349e9118514f383da2ec920a112a42f550702f22587edfdc0a16276 00316782 1 3/6 2014-11-23 02:17:55 10:014:21:12:47
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3000000000000, "key_offsets": [ 150790 ], "k_image": "cd8d8024e7855e4ebf930891d2bf45c7550ad5b6f10403c0b85867a75b458cc8" } }, { "key": { "amount": 60000000000000, "key_offsets": [ 3996 ], "k_image": "624d46a18a32410996e250866511048431bfcb85cdfe1bb68547a6e7b8e6476f" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "31503bbc4e1c3ab041c7b1ad1487ffe6cc64f1034bd7723c1303c6080970727a" } }, { "amount": 900000000000, "target": { "key": "24756b4d0e16af19c6a07e019ea80ae33fbe9060f40088e96eab7de29b3a28bb" } }, { "amount": 5000000000000, "target": { "key": "07df58fe90d83c5fc1eec87e441db9ab0a0bdb28363fc3fe2854aae9827bb45b" } }, { "amount": 7000000000000, "target": { "key": "eff56098bb793c06a13ea20dd61d15a361cc018491e33ece9c7d9edd6017985a" } }, { "amount": 50000000000000, "target": { "key": "39fd04ddad890506babac0e4c76b8e5570c75486177b0f5e251577b903698971" } } ], "extra": [ 2, 33, 0, 100, 81, 171, 216, 108, 247, 103, 75, 165, 194, 119, 51, 20, 15, 56, 98, 203, 236, 238, 140, 0, 139, 208, 22, 121, 107, 97, 177, 23, 112, 227, 184, 1, 255, 161, 223, 252, 114, 5, 245, 152, 52, 229, 44, 50, 137, 134, 172, 215, 141, 49, 216, 105, 40, 182, 47, 121, 58, 97, 185, 129, 72, 148, 10, 235 ], "signatures": [ "adcaefb6e21e5daa7391e84990d0012b96f730b659f5a6e68189a169f7461c099a24152fb9f4e6caca011deb9038df592ad97b8b6e8fde6c7850447f2552e002", "880449f50f25dd38542f049eec1752fb941640d44bdba68de04bb1c8da029c0a700ab8a806753e50a1486693d1bbc05a7917e76775169ff3a3057210d2b38f0d"] }


Less details
source code | moneroexplorer