Monero Transaction b707c6fb7130c3ced482da164909a7604736926f9f4b2b9919a8ae492583d2f8

Autorefresh is OFF

Tx hash: b707c6fb7130c3ced482da164909a7604736926f9f4b2b9919a8ae492583d2f8

Tx prefix hash: ab6dbb8120dccb913da364662a7475f965fe835bb532afcb0e852c606943702c
Tx public key: e2a85936d252d36d9d77fd970342779dff8997c51a24a65a3fc36f7e9a8fc8de
Payment id: f23c7b6d941b4c2b948dcf583c33097ea43b82aedc1f49ee89e1b6a9e68e54c3

Transaction b707c6fb7130c3ced482da164909a7604736926f9f4b2b9919a8ae492583d2f8 was carried out on the Monero network on 2015-05-11 01:50:42. The transaction has 2742904 confirmations. Total output fee is 0.026418707696 XMR.

Timestamp: 1431309042 Timestamp [UTC]: 2015-05-11 01:50:42 Age [y:d:h:m:s]: 09:218:08:27:43
Block: 558344 Fee (per_kB): 0.026418707696 (0.033275223470) Tx size: 0.7939 kB
Tx version: 1 No of confirmations: 2742904 RingCT/type: no
Extra: 022100f23c7b6d941b4c2b948dcf583c33097ea43b82aedc1f49ee89e1b6a9e68e54c301e2a85936d252d36d9d77fd970342779dff8997c51a24a65a3fc36f7e9a8fc8de

8 output(s) for total of 420.000000000000 xmr

stealth address amount amount idx tag
00: 4eb9f6b15a857c0d8a7d1fc1d40d36524eaf700dfdb9d5f159a357d7f87c96eb 0.030000000000 198756 of 324336 -
01: 5ca4a52a900f9d41b84be53b67fc979d886bc74c13628fdea2ee16384a158ee0 0.070000000000 133212 of 263947 -
02: 6541a6c6185c5d5716b96b221ee016c11f4fb59e276f26727b7ee4ea18eb772f 0.900000000000 242233 of 454894 -
03: 5074ea085b05179dabf174df3e08135699970d1fdc26751de0153a8d29879ae4 2.000000000000 265834 of 434058 -
04: 1bb869e84066d880a2af2ae0732a0ca0ab4b08751cf41382b7b5b595ede38d06 7.000000000000 77283 of 285521 -
05: 977f0c27089c0f49a0a6f1442fc4d8491fd9f28c3c2366d36dd5c868f4d4cb6a 30.000000000000 18707 of 49201 -
06: 145ccd51bea60d2aa8d0b41a900d9aeb925a0472025b85b5bf09753da9638ef4 80.000000000000 6535 of 23982 -
07: cdca791729c882d39d0f893fe4a78ee5481760c005ac2bf776ed52394fbea970 300.000000000000 3924 of 16700 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-25 11:24:55 till 2015-05-10 08:34:24; resolution: 1.88 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|

4 inputs(s) for total of 420.026418707696 xmr

key image 00: e5405104c1e173d6ab6e7eaa7a7e42610907b5100a815645c8ee5c830115f441 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0ec5bf736d7110c9a586015a13f953d85320c708e9ca9b5377fcb262e67f3a00 00100902 1 3/3 2014-06-25 12:24:55 10:172:21:53:30
key image 01: f2e17071cd080c60ee46932a98d92a7081c9fcc2954e843b79468c01c0e27740 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c6370085fc08508c58debd896a442f181c6567722442a0f033b1fe556d0c5107 00556224 1 82/7 2015-05-09 12:53:04 09:219:21:25:21
key image 02: 657262df69cbb4ef475418279b6d8217ba614dbba4f25b15187f57766fe774cd amount: 0.021418707696
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ad5af4301b76f5b0d105a07b1c5fc67fc3e76dbdcac83fa0ecaad966f8931fd1 00557278 1 3/5 2015-05-10 07:34:24 09:219:02:44:01
key image 03: b0c9f40e7b02e587881118189c58e5b5b497684eb89c1c29f23226a3b480c645 amount: 400.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4d39c408fca7c6c28191618138c9442288469cb213d41e8f4c9b7ac4e9f5f060 00545776 1 148/14 2015-05-02 06:27:23 09:227:03:51:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 176902 ], "k_image": "e5405104c1e173d6ab6e7eaa7a7e42610907b5100a815645c8ee5c830115f441" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 32932 ], "k_image": "f2e17071cd080c60ee46932a98d92a7081c9fcc2954e843b79468c01c0e27740" } }, { "key": { "amount": 21418707696, "key_offsets": [ 0 ], "k_image": "657262df69cbb4ef475418279b6d8217ba614dbba4f25b15187f57766fe774cd" } }, { "key": { "amount": 400000000000000, "key_offsets": [ 2882 ], "k_image": "b0c9f40e7b02e587881118189c58e5b5b497684eb89c1c29f23226a3b480c645" } } ], "vout": [ { "amount": 30000000000, "target": { "key": "4eb9f6b15a857c0d8a7d1fc1d40d36524eaf700dfdb9d5f159a357d7f87c96eb" } }, { "amount": 70000000000, "target": { "key": "5ca4a52a900f9d41b84be53b67fc979d886bc74c13628fdea2ee16384a158ee0" } }, { "amount": 900000000000, "target": { "key": "6541a6c6185c5d5716b96b221ee016c11f4fb59e276f26727b7ee4ea18eb772f" } }, { "amount": 2000000000000, "target": { "key": "5074ea085b05179dabf174df3e08135699970d1fdc26751de0153a8d29879ae4" } }, { "amount": 7000000000000, "target": { "key": "1bb869e84066d880a2af2ae0732a0ca0ab4b08751cf41382b7b5b595ede38d06" } }, { "amount": 30000000000000, "target": { "key": "977f0c27089c0f49a0a6f1442fc4d8491fd9f28c3c2366d36dd5c868f4d4cb6a" } }, { "amount": 80000000000000, "target": { "key": "145ccd51bea60d2aa8d0b41a900d9aeb925a0472025b85b5bf09753da9638ef4" } }, { "amount": 300000000000000, "target": { "key": "cdca791729c882d39d0f893fe4a78ee5481760c005ac2bf776ed52394fbea970" } } ], "extra": [ 2, 33, 0, 242, 60, 123, 109, 148, 27, 76, 43, 148, 141, 207, 88, 60, 51, 9, 126, 164, 59, 130, 174, 220, 31, 73, 238, 137, 225, 182, 169, 230, 142, 84, 195, 1, 226, 168, 89, 54, 210, 82, 211, 109, 157, 119, 253, 151, 3, 66, 119, 157, 255, 137, 151, 197, 26, 36, 166, 90, 63, 195, 111, 126, 154, 143, 200, 222 ], "signatures": [ "05dc58596c89b6480920286c5bfe6b9ff509085705e22ed4227440ba230dd602f729c62cd77f2a66cf8b11271d89719b465345b376c48808f0cd75d763345502", "88be66852919078501bd3e4b86cd92e83e0c9b617dff3e954334272a72a94e0c916be617f9ebc42f27dbf0f4d464d5c66171b2421f9b3f7bafa8ae2b8a32b80c", "296568b909c6862d724bc986759bc390bc62495ca2e3eeb76602cd149b59210647bf325a4f9f0851f908817b5adf0df728823b2f416eb35146700723bb58220a", "cc0ce8c8eb69be94c15c6234281e7c2a4ed4ca70c19778df6f6aef8057e38f055fc1dc47542568c94ddaf35ac10a1f89ab63bdd042c33da4e410364aaed2a407"] }


Less details
source code | moneroexplorer