Monero Transaction b86a8a76c13ef4bfe71ed746f24739dd96113eda6d2bb8b2f71bcbc8ed37aaab

Autorefresh is OFF

Tx hash: b86a8a76c13ef4bfe71ed746f24739dd96113eda6d2bb8b2f71bcbc8ed37aaab

Tx prefix hash: a35e6797580da5a1e6569aa97b912912c4c9bbcc5391cbf167eb4f2daa77a776
Tx public key: 3b3480b0fe4a5d72bcd74bb3c81c6ad34ce7cd5fdca911e791c6664a286cd772

Transaction b86a8a76c13ef4bfe71ed746f24739dd96113eda6d2bb8b2f71bcbc8ed37aaab was carried out on the Monero network on 2014-11-16 08:19:17. The transaction has 3003898 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1416125957 Timestamp [UTC]: 2014-11-16 08:19:17 Age [y:d:h:m:s]: 10:042:19:04:47
Block: 307211 Fee (per_kB): 0.100000000000 (0.310303030303) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 3003898 RingCT/type: no
Extra: 013b3480b0fe4a5d72bcd74bb3c81c6ad34ce7cd5fdca911e791c6664a286cd772

2 output(s) for total of 0.800000000000 xmr

stealth address amount amount idx tag
00: f78349ab563ac777e23c657604aaec02edf880a6a904579d1e6c2decd4f4898e 0.200000000000 623130 of 1272211 -
01: 52d11de567af47b4d4b1d4488bed76db6eec768bd9b63ecff2abc9d409f6e23b 0.600000000000 277609 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-13 08:16:26 till 2014-11-13 11:17:45; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

2 inputs(s) for total of 0.900000000000 xmr

key image 00: faf19afb76e923b4e8b8816867d6b3cb461090b804024e02a9a4707e0d85bf4f amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 28977a551d152aae361edc49ea85724e8bb7e7bbee0912173c824dde9482e4da 00302948 1 2/48 2014-11-13 09:16:26 10:045:18:07:38
key image 01: 661ff01a942465e6b3cb080e34c17106c0cb262d74394a7d731fd02391eb8e13 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 52a2d546973fb7add7150ecbb46ae12b62db68df76943f96c4b6130b2504e29e 00303036 1 9/54 2014-11-13 10:17:45 10:045:17:06:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 274233 ], "k_image": "faf19afb76e923b4e8b8816867d6b3cb461090b804024e02a9a4707e0d85bf4f" } }, { "key": { "amount": 300000000000, "key_offsets": [ 331864 ], "k_image": "661ff01a942465e6b3cb080e34c17106c0cb262d74394a7d731fd02391eb8e13" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "f78349ab563ac777e23c657604aaec02edf880a6a904579d1e6c2decd4f4898e" } }, { "amount": 600000000000, "target": { "key": "52d11de567af47b4d4b1d4488bed76db6eec768bd9b63ecff2abc9d409f6e23b" } } ], "extra": [ 1, 59, 52, 128, 176, 254, 74, 93, 114, 188, 215, 75, 179, 200, 28, 106, 211, 76, 231, 205, 95, 220, 169, 17, 231, 145, 198, 102, 74, 40, 108, 215, 114 ], "signatures": [ "dc1f13c4db1dc27355c1e29222791b451984a8515eaf5223cb369d35c013e70ecf89466ef01e1ed0220e907b8f1157b13b3cade998e265e0fbd30242f1533403", "72e5cbbef9864ee9a26a6ef7549cfc920a571581a1d8c85c0ac41ed3bdf30a0bd7a5176da96ba87e8c2730b664c4217ddf2d312c74514d9d85eb24ea69ebe705"] }


Less details
source code | moneroexplorer