Monero Transaction b72afff5f5e801579fc9a9a510671c631e61602827d8c4b8ebe4bece086aac3a

Autorefresh is OFF

Tx hash: b72afff5f5e801579fc9a9a510671c631e61602827d8c4b8ebe4bece086aac3a

Tx prefix hash: 2a894f4fedfa3bd0cb690b2c567fd9bae3c99d221ce258d48d101b5b10b6a19a
Tx public key: 4aaf785123797a5d90feecadc9fd45ef6168e187c3d5e4841a148b2958b4a74c

Transaction b72afff5f5e801579fc9a9a510671c631e61602827d8c4b8ebe4bece086aac3a was carried out on the Monero network on 2016-09-28 19:18:35. The transaction has 2158654 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1475090315 Timestamp [UTC]: 2016-09-28 19:18:35 Age [y:d:h:m:s]: 08:081:07:15:54
Block: 1145988 Fee (per_kB): 0.010000000000 (0.020983606557) Tx size: 0.4766 kB
Tx version: 1 No of confirmations: 2158654 RingCT/type: no
Extra: 014aaf785123797a5d90feecadc9fd45ef6168e187c3d5e4841a148b2958b4a74c

2 output(s) for total of 0.040000000000 xmr

stealth address amount amount idx tag
00: 6afd138883139453b02d40141d65f5006629e3d02684f7858ac0f7a38059d2ee 0.020000000000 343658 of 381492 -
01: c868440f4270ddc01e99dcec97cfdade432e02d1df74378f56a693976804a040 0.020000000000 343659 of 381492 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 20:14:08 till 2016-09-28 19:47:39; resolution: 4.94 days)

  • |_*_______________*_____________________________________________________________*_________________*_______________________________________________________________________*|

1 inputs(s) for total of 0.050000000000 xmr

key image 00: 1911b24622febfb6ce74435330cc5857d8189c20371c0c4bff6a210a708daae0 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68ae0d24c41c0422ea43468781b318beefe011c211d63cde05cd9b253b6a5a86 00082504 1 1/120 2014-06-12 21:14:08 10:190:05:20:21
- 01: 40166924ac9a44a4eb2d4bd5724615f340071ad6031523eab1ad68f33cea55fa 00200929 0 0/6 2014-09-02 23:59:03 10:108:02:35:26
- 02: d717c8cebdbd499c9a269467059eeb5b8646d682829ff475e653ac8b22d53a93 00642570 1 5/6 2015-07-08 23:17:25 09:164:03:17:04
- 03: d6cd3197dbf6e17f8842ca984891fe6eedda6bb282e99e5d7bc7dd86eefc036c 00770677 0 0/4 2015-10-06 18:54:43 09:074:07:39:46
- 04: 2d40b77ca733f5402f33b51bde7f00536d409a45619e997f0abc0c4f9eb6b8f9 01145967 3 1/2 2016-09-28 18:47:39 08:081:07:46:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000, "key_offsets": [ 55669, 70409, 39782, 16247, 63953 ], "k_image": "1911b24622febfb6ce74435330cc5857d8189c20371c0c4bff6a210a708daae0" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "6afd138883139453b02d40141d65f5006629e3d02684f7858ac0f7a38059d2ee" } }, { "amount": 20000000000, "target": { "key": "c868440f4270ddc01e99dcec97cfdade432e02d1df74378f56a693976804a040" } } ], "extra": [ 1, 74, 175, 120, 81, 35, 121, 122, 93, 144, 254, 236, 173, 201, 253, 69, 239, 97, 104, 225, 135, 195, 213, 228, 132, 26, 20, 139, 41, 88, 180, 167, 76 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer