Monero Transaction b71f5b87bef5e00d1634817fc94e8025581a03e2475a95fb19433e8e699b14bb

Autorefresh is OFF

Tx hash: b71f5b87bef5e00d1634817fc94e8025581a03e2475a95fb19433e8e699b14bb

Tx prefix hash: b71839da8b488356b3b5ef0bfa75cd2bcf66243d78d228a9bd98960a94f09b54
Tx public key: a4729e6d61df812f70cadc2f9a4b1412326ec7af8411e112dce1991e2dc67b9f
Payment id: 6b48878e24e0c8061ba3d74d1ac9fb06ac28a9c91ba60f91d26892618bb1203a

Transaction b71f5b87bef5e00d1634817fc94e8025581a03e2475a95fb19433e8e699b14bb was carried out on the Monero network on 2014-09-28 04:25:51. The transaction has 3070511 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1411878351 Timestamp [UTC]: 2014-09-28 04:25:51 Age [y:d:h:m:s]: 10:086:21:38:10
Block: 236984 Fee (per_kB): 0.100000000000 (0.271618037135) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 3070511 RingCT/type: no
Extra: 0221006b48878e24e0c8061ba3d74d1ac9fb06ac28a9c91ba60f91d26892618bb1203a01a4729e6d61df812f70cadc2f9a4b1412326ec7af8411e112dce1991e2dc67b9f

5 output(s) for total of 29.900000000000 xmr

stealth address amount amount idx tag
00: 39cab2e9dd11c5fcfc25037bb2ba6b7b2962da4b6357271de8bf088bf81f359f 0.300000000000 257494 of 976536 -
01: 5cabe3f61500a3a5d3c221a29502ffed399a8221711fc3db1f65daf92e785700 0.600000000000 219643 of 650760 -
02: e5da4bad38f95cc5e6966fe6c4ab4290f3b264fcfb0ba719bf9206d0df0cfb00 1.000000000000 281139 of 874630 -
03: 9a460066948bf5ec92809e3911ed1c64e7a9c2ccde31f0b4c06d95905f6f91d4 8.000000000000 19785 of 226902 -
04: 1913be8ec0e16b3dd77cac707eba920df190d697d65ed8fcbc93b88c29b62e92 20.000000000000 15182 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-27 09:16:42 till 2014-09-27 11:16:42; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 30.000000000000 xmr

key image 00: 230da067c08a63a72280ff2561a8ca154b533396c0b945e5a1a1022c9ed3bd19 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2e29735262c1740d4e7bfc8004078600aca286fbddf6f653350cf10e2dbaf568 00235965 1 2/6 2014-09-27 10:16:42 10:087:15:47:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000000, "key_offsets": [ 8092 ], "k_image": "230da067c08a63a72280ff2561a8ca154b533396c0b945e5a1a1022c9ed3bd19" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "39cab2e9dd11c5fcfc25037bb2ba6b7b2962da4b6357271de8bf088bf81f359f" } }, { "amount": 600000000000, "target": { "key": "5cabe3f61500a3a5d3c221a29502ffed399a8221711fc3db1f65daf92e785700" } }, { "amount": 1000000000000, "target": { "key": "e5da4bad38f95cc5e6966fe6c4ab4290f3b264fcfb0ba719bf9206d0df0cfb00" } }, { "amount": 8000000000000, "target": { "key": "9a460066948bf5ec92809e3911ed1c64e7a9c2ccde31f0b4c06d95905f6f91d4" } }, { "amount": 20000000000000, "target": { "key": "1913be8ec0e16b3dd77cac707eba920df190d697d65ed8fcbc93b88c29b62e92" } } ], "extra": [ 2, 33, 0, 107, 72, 135, 142, 36, 224, 200, 6, 27, 163, 215, 77, 26, 201, 251, 6, 172, 40, 169, 201, 27, 166, 15, 145, 210, 104, 146, 97, 139, 177, 32, 58, 1, 164, 114, 158, 109, 97, 223, 129, 47, 112, 202, 220, 47, 154, 75, 20, 18, 50, 110, 199, 175, 132, 17, 225, 18, 220, 225, 153, 30, 45, 198, 123, 159 ], "signatures": [ "fa5142999ddec831994b55cd8f9c0a1699adc714b7e755611bdd2e71c26e950b0938c03817f1e2f2b36e78a75ccf4dd34652d6f1bde3a4d9b64816501151e501"] }


Less details
source code | moneroexplorer