Monero Transaction b960bfb19a18f2fb046f9cab9391caeb87f7b7eb50ca383fec16f379e42a8578

Autorefresh is OFF

Tx hash: b960bfb19a18f2fb046f9cab9391caeb87f7b7eb50ca383fec16f379e42a8578

Tx prefix hash: 40a1962cd1bb374fdf958cd344aca3b635ce68b087f0e184cc22ddead54ef540
Tx public key: c3538aa20891fcd81c9207d80df65f3b5201c3da845b182cc7935a0c029b860f
Payment id: 12f35c5df6adfba1041fe9efa46f808244089086f3dc4837a8fde67a945b1c50

Transaction b960bfb19a18f2fb046f9cab9391caeb87f7b7eb50ca383fec16f379e42a8578 was carried out on the Monero network on 2014-12-14 13:30:52. The transaction has 2956229 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1418563852 Timestamp [UTC]: 2014-12-14 13:30:52 Age [y:d:h:m:s]: 10:004:06:24:14
Block: 347481 Fee (per_kB): 0.010000000000 (0.027161803714) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 2956229 RingCT/type: no
Extra: 02210012f35c5df6adfba1041fe9efa46f808244089086f3dc4837a8fde67a945b1c5001c3538aa20891fcd81c9207d80df65f3b5201c3da845b182cc7935a0c029b860f

5 output(s) for total of 9.990000000000 xmr

stealth address amount amount idx tag
00: b35c6c7808691de73c821d29ab3ac962da76429ffd9a83d2a099c825a729ef39 0.090000000000 126623 of 317822 -
01: 18ae8eda6565f74510084d4b6dc6f2bf6bcdbbb72de5a4d9b304ef0bb513ba62 0.100000000000 671410 of 982315 -
02: 1595bfdf26d214fb609feee0408f38870099303db752b393b6e983d366ec0800 0.800000000000 220855 of 489955 -
03: 6bbf83b9c62ac5f53920ee828053dab7d55f17d337fb0b77bce6ae0955b3eacd 3.000000000000 161652 of 300495 -
04: b73c52451ee5fde3cabea7e1b7bbcaf6766cd3eb3be757c3177a4689569957c7 6.000000000000 92432 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-14 11:30:17 till 2014-12-14 13:30:17; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 10.000000000000 xmr

key image 00: a576a2e3801894a81bf905e62b80fe249dd303ef24ccead2361dc46dd4702d8d amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8520d262ba50ccfa442cc6a26eff023724469b1647d986d5b60a979e0d39c32e 00347398 0 0/4 2014-12-14 12:30:17 10:004:07:24:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000000, "key_offsets": [ 402535 ], "k_image": "a576a2e3801894a81bf905e62b80fe249dd303ef24ccead2361dc46dd4702d8d" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "b35c6c7808691de73c821d29ab3ac962da76429ffd9a83d2a099c825a729ef39" } }, { "amount": 100000000000, "target": { "key": "18ae8eda6565f74510084d4b6dc6f2bf6bcdbbb72de5a4d9b304ef0bb513ba62" } }, { "amount": 800000000000, "target": { "key": "1595bfdf26d214fb609feee0408f38870099303db752b393b6e983d366ec0800" } }, { "amount": 3000000000000, "target": { "key": "6bbf83b9c62ac5f53920ee828053dab7d55f17d337fb0b77bce6ae0955b3eacd" } }, { "amount": 6000000000000, "target": { "key": "b73c52451ee5fde3cabea7e1b7bbcaf6766cd3eb3be757c3177a4689569957c7" } } ], "extra": [ 2, 33, 0, 18, 243, 92, 93, 246, 173, 251, 161, 4, 31, 233, 239, 164, 111, 128, 130, 68, 8, 144, 134, 243, 220, 72, 55, 168, 253, 230, 122, 148, 91, 28, 80, 1, 195, 83, 138, 162, 8, 145, 252, 216, 28, 146, 7, 216, 13, 246, 95, 59, 82, 1, 195, 218, 132, 91, 24, 44, 199, 147, 90, 12, 2, 155, 134, 15 ], "signatures": [ "cc658d555dbe95477eff31c356a36f950f307ebf4eeb9b4b7fa282188954870cfae29d82d98572e52acf98e69dba44ebdd9d59611972575a9c1eef17e743b30b"] }


Less details
source code | moneroexplorer