Monero Transaction b70681742d6b9cd3233cce4d1fad08018e2d10251e65ba01a307450aeb83932c

Autorefresh is OFF

Tx hash: b70681742d6b9cd3233cce4d1fad08018e2d10251e65ba01a307450aeb83932c

Tx prefix hash: e68b325b80c93767fe78b2f0f279969425228f20c6083f7c27b464225a2fa7d1
Tx public key: 14029cdaa1f253d99cbe1d107209efdb151d1bb26a353b2fcd2458b338072247
Payment id: 50bc0d7b6a0b0fadadde358098f6484b2721f37b84ea7ef4c36a632f6b4d6f23

Transaction b70681742d6b9cd3233cce4d1fad08018e2d10251e65ba01a307450aeb83932c was carried out on the Monero network on 2014-08-13 00:56:16. The transaction has 3136546 confirmations. Total output fee is 0.005095600000 XMR.

Timestamp: 1407891376 Timestamp [UTC]: 2014-08-13 00:56:16 Age [y:d:h:m:s]: 10:132:21:26:02
Block: 170842 Fee (per_kB): 0.005095600000 (0.005533292047) Tx size: 0.9209 kB
Tx version: 1 No of confirmations: 3136546 RingCT/type: no
Extra: 02210050bc0d7b6a0b0fadadde358098f6484b2721f37b84ea7ef4c36a632f6b4d6f230114029cdaa1f253d99cbe1d107209efdb151d1bb26a353b2fcd2458b338072247

9 output(s) for total of 10.004904400000 xmr

stealth address amount amount idx tag
00: a6772815f9e074a05577c7db3c6612aa484e8e711a08e50ada3a1fe2a9b5b96e 0.000904400000 0 of 3 -
01: b846b547894f52856dcc4a81365f7efd49d4418875195ad1cecf901f35498695 0.006000000000 182797 of 256624 -
02: ca8bdc14f37ddc36418504cfaa571a3140b0a96b284ced1027b71cc5ade2ae0e 0.008000000000 166610 of 245068 -
03: 0e0492a238fcf604d7f93d6b6ec314c1a86c1a72fdc53815ae1a64919ad181c0 0.040000000000 134085 of 294095 -
04: ba48f6a15267f36b11d416bc09539f25c38706318e63831b9fd5a0e7ac793ac4 0.050000000000 118283 of 284522 -
05: de0538a74940e7e4516885886c4f4dd16ec97d1404343830711962ebcbe4ca69 0.100000000000 414218 of 982315 -
06: b221064f23e74f719288943219af3377f7c3d46b594ba582bf7bff0b2e2e10f9 0.800000000000 110246 of 489955 -
07: cead95d5e46f07e59b0e1062b9f53283a2c3dcf287a29dbbb14bf01749d02cc8 4.000000000000 37104 of 237197 -
08: 373f94c5cc3b15b7a8487d342ab506fdb343e413fede0308f4837afd59f35923 5.000000000000 102923 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-22 00:33:11 till 2014-08-12 23:53:56; resolution: 0.49 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________*________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________*_____________________________________________________________________*|

3 inputs(s) for total of 10.010000000000 xmr

key image 00: 22679f896feac70b94cdcaf8dc1dce24ebe28942c8ea27d1b585b0820ce1e912 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d06589d5e2a2a12a375b075ba65886253e62d81ab285f484197453e5bda19d19 00050824 0 0/9 2014-05-22 01:33:11 10:215:20:49:07
- 01: 2141e2904789ffc410193f4878e372ef1cdaf7750e3fbadc1031450268c57bf5 00170620 2 8/8 2014-08-12 20:55:36 10:133:01:26:42
key image 01: 35cf6117600bf7ae3e5de1fcfda0df5b73ecdf0b6645d994bd243ecb145a886e amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3c27546e7e275dab0668cb78af062ff9cfbc88fc1a3cfa4aceebd3263bc1df57 00073344 1 3/11 2014-06-06 12:37:50 10:200:09:44:28
- 01: 2fa3edbe546bf0791f9849beb5aebddb24d13b958fba5e0db65f38f18a542211 00170731 0 0/5 2014-08-12 22:53:56 10:132:23:28:22
key image 02: 1dca07d6ee88528b02e74ac3ad3433fdcf6bb1e0ffada721c96d1a7ce34bd11c amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 412437ca5267926f24507d008bb1ff9cf8a3013d647beffd428cd2ee263be534 00120595 1 7/3 2014-07-09 03:34:55 10:167:18:47:23
- 01: ecb12018398f14d53989c4468a6dd5ca1dfd657f0e4d954f6875413770e7cbb6 00170718 2 6/7 2014-08-12 22:38:15 10:132:23:44:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 7190, 323428 ], "k_image": "22679f896feac70b94cdcaf8dc1dce24ebe28942c8ea27d1b585b0820ce1e912" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 5403, 97479 ], "k_image": "35cf6117600bf7ae3e5de1fcfda0df5b73ecdf0b6645d994bd243ecb145a886e" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 42660, 60216 ], "k_image": "1dca07d6ee88528b02e74ac3ad3433fdcf6bb1e0ffada721c96d1a7ce34bd11c" } } ], "vout": [ { "amount": 904400000, "target": { "key": "a6772815f9e074a05577c7db3c6612aa484e8e711a08e50ada3a1fe2a9b5b96e" } }, { "amount": 6000000000, "target": { "key": "b846b547894f52856dcc4a81365f7efd49d4418875195ad1cecf901f35498695" } }, { "amount": 8000000000, "target": { "key": "ca8bdc14f37ddc36418504cfaa571a3140b0a96b284ced1027b71cc5ade2ae0e" } }, { "amount": 40000000000, "target": { "key": "0e0492a238fcf604d7f93d6b6ec314c1a86c1a72fdc53815ae1a64919ad181c0" } }, { "amount": 50000000000, "target": { "key": "ba48f6a15267f36b11d416bc09539f25c38706318e63831b9fd5a0e7ac793ac4" } }, { "amount": 100000000000, "target": { "key": "de0538a74940e7e4516885886c4f4dd16ec97d1404343830711962ebcbe4ca69" } }, { "amount": 800000000000, "target": { "key": "b221064f23e74f719288943219af3377f7c3d46b594ba582bf7bff0b2e2e10f9" } }, { "amount": 4000000000000, "target": { "key": "cead95d5e46f07e59b0e1062b9f53283a2c3dcf287a29dbbb14bf01749d02cc8" } }, { "amount": 5000000000000, "target": { "key": "373f94c5cc3b15b7a8487d342ab506fdb343e413fede0308f4837afd59f35923" } } ], "extra": [ 2, 33, 0, 80, 188, 13, 123, 106, 11, 15, 173, 173, 222, 53, 128, 152, 246, 72, 75, 39, 33, 243, 123, 132, 234, 126, 244, 195, 106, 99, 47, 107, 77, 111, 35, 1, 20, 2, 156, 218, 161, 242, 83, 217, 156, 190, 29, 16, 114, 9, 239, 219, 21, 29, 27, 178, 106, 53, 59, 47, 205, 36, 88, 179, 56, 7, 34, 71 ], "signatures": [ "1b77b331fdfd9db2d00efb036fd3abcc2fc73e162ea818c5aa9be95e4dca390a0e0a0b46f7a68ffd0340042abc5cdbf050dd640f0b347ff5d7f120c6b70a7d06eee5029736670c247c602d800c67b173f690ee471fe52ac3607e28abbab4b906b71d6453fc2237db20bc20a44b9a17dd565cd4cf6dfafab02234d9ab6f9c7507", "90baabb834db6056c58f951345bc36e261f220b2d231882c41caf9e64ce043079d2d4712e8ad7115c4ea5ada71162eb63422c99da83c1939509cb89a8ae7540365147746e662bb9c7133ec9d1e5634366642e495cbb11c1d2fa68812d352920bd767d892235d3b902e932f9c5ee316ec02eebf58557560f5cbcd5f8b6c1cc600", "8f413e274c4dd4a4dfeac81e1971b90530eda49d8e9ddddc11dfbde4e9854b07b8fe80870e7cf7e4981de05d4916eaac38985b7039c76948bff4b709b30d1d0ad33a3f6fe63692700680063648acf3c762d8e81c28e5e1aa2dfaea48259f3b071c7f767839437af2dedd16c9634e053c7ce14708a891e47bc4f02e4187c17b0f"] }


Less details
source code | moneroexplorer