Monero Transaction b870669f3d2a2705dcae921dbe5f3d828a3f669d8a809791adcf6a8d654976ed

Autorefresh is OFF

Tx hash: b870669f3d2a2705dcae921dbe5f3d828a3f669d8a809791adcf6a8d654976ed

Tx prefix hash: c93a8289947a300abb863abc133a9f6b7b736ece03118b05124309ec707c5363
Tx public key: accea2194b509c13c5613dcc3035c6999358d45d797bf859214a47632191c913

Transaction b870669f3d2a2705dcae921dbe5f3d828a3f669d8a809791adcf6a8d654976ed was carried out on the Monero network on 2014-07-09 04:23:16. The transaction has 3157738 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404879796 Timestamp [UTC]: 2014-07-09 04:23:16 Age [y:d:h:m:s]: 10:127:09:54:36
Block: 120645 Fee (per_kB): 0.010000000000 (0.012075471698) Tx size: 0.8281 kB
Tx version: 1 No of confirmations: 3157738 RingCT/type: no
Extra: 01accea2194b509c13c5613dcc3035c6999358d45d797bf859214a47632191c913

7 output(s) for total of 48.930000000000 xmr

stealth address amount amount idx tag
00: 64b4d5a8a486cebea324b679c774a0bb72d3da379015a94b0a258a6ef879c858 0.030000000000 146561 of 324336 -
01: 7c89d0f085228f7ed83e01a9cfce3b95168e042f1267944c87ac0ad0ac407985 0.300000000000 89872 of 976536 -
02: 51bb05def5d1bae3af2875664ad104a6d69c51bb72394a207d5cde7e23ee6a51 0.600000000000 66893 of 650760 -
03: 09c61382ab86c0f08b194e6070b4f2575aeaa157f6cab553ef06f8ce5c3737f5 3.000000000000 24047 of 300495 -
04: aecd0706093ba4ef169a83d0968d7304255390032b104a9aa87cbce8e625f7aa 5.000000000000 42720 of 255089 -
05: b92031b88ca4b8bc433d2928c04cd1ee698e929459ca9413a879af8b3763c516 10.000000000000 134956 of 921411 -
06: fec893adec6073f5867fdce49be6bc69e770db869e6a4d79dea8301cd585f648 30.000000000000 2689 of 49201 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-08 07:47:56 till 2014-07-09 00:12:44; resolution: 0.00 days)

  • |_____________________________________________________________________________________________________________________________________________*____________________________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |_________________________________*________________________________________________________________________________________________________________________________________|
  • |___________*______________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________*_______________________________________________|

5 inputs(s) for total of 48.940000000000 xmr

key image 00: ba914fe14da53724a75c82f50329f571f238a0d679c702d873017bef323db301 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f20086e7d9c11b1daddbff2954b2563acad520c3fed81df143f0eaee5c467d38 00120225 1 2/4 2014-07-08 21:23:51 10:127:16:54:01
key image 01: e05f6e9f98bb9e0e4e73357f5592f2586015666a04282c58c14a821dba40e0bb amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 156ee30eb7c8480bafafd11b8838449121107364c77952ef9360366baa2999af 00120320 1 1/5 2014-07-08 23:12:44 10:127:15:05:08
key image 02: 9095924d8c0cae018b99af01ef18d3a042995159d3a634aa33e439fec79b3255 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d3c90368210a4b4b97a5dff4de7743f4558977f76365116cfecf0b52d2ff95d2 00119579 1 1/7 2014-07-08 10:55:36 10:128:03:22:16
key image 03: 957fd140d6f6956766378ff1c82eab23f05a00b2d6596af019914f471673928d amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 34acf40cf207d93c9bca4b15ae209e59d86f1e081f398e1a1ac478ecfb318dee 00119458 1 3/6 2014-07-08 08:47:56 10:128:05:29:56
key image 04: c73009db9326cba2b6237ed68060cb7bb52421413551ce9800fd7919cd3b9686 amount: 40.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7e1d5ea3d3bbc18256d22dbb30a5274e2e0e9dba69859104a67b58b17076faf5 00120120 1 1/7 2014-07-08 19:37:08 10:127:18:40:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000000, "key_offsets": [ 8100 ], "k_image": "ba914fe14da53724a75c82f50329f571f238a0d679c702d873017bef323db301" } }, { "key": { "amount": 400000000000, "key_offsets": [ 73664 ], "k_image": "e05f6e9f98bb9e0e4e73357f5592f2586015666a04282c58c14a821dba40e0bb" } }, { "key": { "amount": 500000000000, "key_offsets": [ 103296 ], "k_image": "9095924d8c0cae018b99af01ef18d3a042995159d3a634aa33e439fec79b3255" } }, { "key": { "amount": 40000000000, "key_offsets": [ 118607 ], "k_image": "957fd140d6f6956766378ff1c82eab23f05a00b2d6596af019914f471673928d" } }, { "key": { "amount": 40000000000000, "key_offsets": [ 1903 ], "k_image": "c73009db9326cba2b6237ed68060cb7bb52421413551ce9800fd7919cd3b9686" } } ], "vout": [ { "amount": 30000000000, "target": { "key": "64b4d5a8a486cebea324b679c774a0bb72d3da379015a94b0a258a6ef879c858" } }, { "amount": 300000000000, "target": { "key": "7c89d0f085228f7ed83e01a9cfce3b95168e042f1267944c87ac0ad0ac407985" } }, { "amount": 600000000000, "target": { "key": "51bb05def5d1bae3af2875664ad104a6d69c51bb72394a207d5cde7e23ee6a51" } }, { "amount": 3000000000000, "target": { "key": "09c61382ab86c0f08b194e6070b4f2575aeaa157f6cab553ef06f8ce5c3737f5" } }, { "amount": 5000000000000, "target": { "key": "aecd0706093ba4ef169a83d0968d7304255390032b104a9aa87cbce8e625f7aa" } }, { "amount": 10000000000000, "target": { "key": "b92031b88ca4b8bc433d2928c04cd1ee698e929459ca9413a879af8b3763c516" } }, { "amount": 30000000000000, "target": { "key": "fec893adec6073f5867fdce49be6bc69e770db869e6a4d79dea8301cd585f648" } } ], "extra": [ 1, 172, 206, 162, 25, 75, 80, 156, 19, 197, 97, 61, 204, 48, 53, 198, 153, 147, 88, 212, 93, 121, 123, 248, 89, 33, 74, 71, 99, 33, 145, 201, 19 ], "signatures": [ "600ec1da051bbe1521820093e8932ea927a2285eac3f6cdcabd3091459ae0106a1cb8d6efef1c00f5e34380ed17305e8d117abee276b04d2261677968cfb9f00", "8fadc605c7379828f962ae37d35d2e37da823db58cde6020784f028b64b7f309f684a65905e262d7fab710704c3d8e8bdf5b688591718483ded63657b298f20b", "f7fe9b85add2b591ae9bbba1ee8c7cfd92cc381bb3aee7c68ac4f9532bad40062512cf70d53acf8069b0d79b1b43c5dc67431da9a07f4138ebea07ae86138900", "4368b399b30a400f2e1299b2c24551ca63673f75b0d86a242925ed6eaab4c2052be8614968841dfe48fc5b76bfef97ba9150c87fe1fc27d364a78691e8adfb0a", "95f5e44e2892ec8623ecc14bf6751a9bb7295282b390804cd7ed58f877bdda02d2417e958a45e2acabeea2c430eb679da8b9a69d6e69db6e0992b6613570e30f"] }


Less details
source code | moneroexplorer