Monero Transaction b79870062999605aa0a39e21298ec384f6f6b9730b7985fdf52f5ace87168caa

Autorefresh is OFF

Tx hash: b79870062999605aa0a39e21298ec384f6f6b9730b7985fdf52f5ace87168caa

Tx prefix hash: 2ccb1abc886b76b7cee9031248411d39bd0f6011ea2fb620b5f8fc55774c6f55
Tx public key: 6aca546f472b4453de4dffb69120e352e80c277fc964643f52cd184459176230

Transaction b79870062999605aa0a39e21298ec384f6f6b9730b7985fdf52f5ace87168caa was carried out on the Monero network on 2014-06-12 08:32:23. The transaction has 3160478 confirmations. Total output fee is 0.005793161107 XMR.

Timestamp: 1402561943 Timestamp [UTC]: 2014-06-12 08:32:23 Age [y:d:h:m:s]: 10:103:23:13:46
Block: 81733 Fee (per_kB): 0.005793161107 (0.015904013334) Tx size: 0.3643 kB
Tx version: 1 No of confirmations: 3160478 RingCT/type: no
Extra: 016aca546f472b4453de4dffb69120e352e80c277fc964643f52cd184459176230

6 output(s) for total of 0.044206838893 xmr

stealth address amount amount idx tag
00: 85c04548c3c1c60c28135549c1bd83c6f0947bbce9ef4c0a94fd044419b1fae3 0.001369807924 0 of 5 -
01: cfb015c12dfe330782606a600d75ee0e8ea87e8b464fdecc4fc59df7cab89636 0.001598109244 0 of 3 -
02: b232abc13c1667701114518ad0f53b6fb0c48cc2444bb841862c6fbdd6d16b8d 0.002511314527 0 of 5 -
03: 2a14a96a28256b8dca3f60cdc8f38807344dd3049a14cd879aa0bc868c290405 0.002727607198 0 of 1 -
04: 674cdc8f64fe7c9f2fb18924d0acad924ab0287188d2d0344d47dc09a946c188 0.006000000000 90394 of 256624 -
05: 45f1ea6b7259a2061cd8d2890e459f2e1d90d754a44e7bb639132499c3935629 0.030000000000 76489 of 324336 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 06:34:56 till 2014-06-12 08:34:56; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.050000000000 xmr

key image 00: 1b7f8b0c3443800d059435f318b536b922e0b15163f5ab5222e60eb1e46854fd amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 742cf328dfa74e5430a93deab1a94d2ef5ffbed4e0aca51224e757520282a792 00081675 1 1/24 2014-06-12 07:34:56 10:104:00:11:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000, "key_offsets": [ 52878 ], "k_image": "1b7f8b0c3443800d059435f318b536b922e0b15163f5ab5222e60eb1e46854fd" } } ], "vout": [ { "amount": 1369807924, "target": { "key": "85c04548c3c1c60c28135549c1bd83c6f0947bbce9ef4c0a94fd044419b1fae3" } }, { "amount": 1598109244, "target": { "key": "cfb015c12dfe330782606a600d75ee0e8ea87e8b464fdecc4fc59df7cab89636" } }, { "amount": 2511314527, "target": { "key": "b232abc13c1667701114518ad0f53b6fb0c48cc2444bb841862c6fbdd6d16b8d" } }, { "amount": 2727607198, "target": { "key": "2a14a96a28256b8dca3f60cdc8f38807344dd3049a14cd879aa0bc868c290405" } }, { "amount": 6000000000, "target": { "key": "674cdc8f64fe7c9f2fb18924d0acad924ab0287188d2d0344d47dc09a946c188" } }, { "amount": 30000000000, "target": { "key": "45f1ea6b7259a2061cd8d2890e459f2e1d90d754a44e7bb639132499c3935629" } } ], "extra": [ 1, 106, 202, 84, 111, 71, 43, 68, 83, 222, 77, 255, 182, 145, 32, 227, 82, 232, 12, 39, 127, 201, 100, 100, 63, 82, 205, 24, 68, 89, 23, 98, 48 ], "signatures": [ "3656e74e47c0ceceed06b6957aa7afdf0d92845f6a1dffdbdf332488868e56031317f5d3a991e091c44010a78cde0a1e1e417adbb8de4cb082f8f0d9f0afa70f"] }


Less details
source code | moneroexplorer