Monero Transaction f69ba5a6a8befaef6e930d94caf0e49a59b322a2e497105cfc3bac7b53602e1b

Autorefresh is OFF

Tx hash: f69ba5a6a8befaef6e930d94caf0e49a59b322a2e497105cfc3bac7b53602e1b

Tx prefix hash: a30a0b0ca1c050a05b30f9d41e9970c2ffbc9453c6eb4ddfb792c469b10edd06
Tx public key: 20fd2c5338c1a1ef732d5dabee41d1f8dc397e6153b52b93cca38a97a6f564d1
Payment id: 8365372e855498964a533e72d11418d68f9d7bb0cc07ef380f34a65635e64ca6

Transaction f69ba5a6a8befaef6e930d94caf0e49a59b322a2e497105cfc3bac7b53602e1b was carried out on the Monero network on 2014-09-30 22:28:31. The transaction has 3051052 confirmations. Total output fee is 0.139294387820 XMR.

Timestamp: 1412116111 Timestamp [UTC]: 2014-09-30 22:28:31 Age [y:d:h:m:s]: 10:062:16:21:03
Block: 241015 Fee (per_kB): 0.139294387820 (0.178074223630) Tx size: 0.7822 kB
Tx version: 1 No of confirmations: 3051052 RingCT/type: no
Extra: 0221008365372e855498964a533e72d11418d68f9d7bb0cc07ef380f34a65635e64ca60120fd2c5338c1a1ef732d5dabee41d1f8dc397e6153b52b93cca38a97a6f564d1

5 output(s) for total of 12.533194820000 xmr

stealth address amount amount idx tag
00: 3674d424924b89610f0c973782d062948f81c6bedbe14f8d73f92632e2f997b3 0.033194820000 0 of 1 -
01: 35e09c9352f4efb0660ed75d8350cc7ec2eca61e4237d370ff79ab62d7986590 0.200000000000 536477 of 1272210 -
02: afb0bb9ec70e7627c50b54f433e2c155ec3c925f50d55a488f1be43971375331 0.300000000000 261907 of 976536 -
03: 35a1c84a23e338a6047fe1d98be8e5bb48712840b0e8f7b4eb347f9e05b7dee6 2.000000000000 109429 of 434057 -
04: e4b2c6f8043578227a419c7da01bdf41750cb94e24a27e485d4d9bfca4b27b00 10.000000000000 280570 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-27 20:05:18 till 2014-09-30 18:45:53; resolution: 0.02 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________*_____________________|
  • |_______________________________________________________________________________________________________________________________________*__________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

5 inputs(s) for total of 12.672489207820 xmr

key image 00: b0d73aa25be59c8b0add0ebd8615f38ee69f983cffae176b0635225eb31eb0e7 amount: 0.072489207820
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6c5dd42f70df8a26e86e709050d7539c88f3e1e0aadc617a9a0425d08f02cd86 00236574 0 0/3 2014-09-27 21:05:18 10:065:17:44:16
key image 01: a609c8444c05baca8d182713f15cd860aefa33eb604cc8266db3e589e6a7873e amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 93b20292f8f76665f94f770430dcf525daa5cce1575bd0bb583db3e0a436e3b1 00240241 0 0/4 2014-09-30 09:53:02 10:063:04:56:32
key image 02: cb67a4d79700b662ca7230b9f598ada9385a2aa0c2bac439605b4a13c188ae18 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 104dd6c12df8684d88ecc68d7681341dff16a404772d99a583b8db94bea0ef20 00239837 1 5/92 2014-09-30 04:17:27 10:063:10:32:07
key image 03: dd2933f6667b7eaee76bd2da9107ea82dcee0e078e55022c95909138e68be4d1 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: db795e1ee9ddbd68f19d7bc2f6fafa1c03c8b4ea8fa22224c52f2d73dd31cd86 00240484 0 0/3 2014-09-30 13:35:53 10:063:01:13:41
key image 04: 6ecb11b51dbf37954bdb94a833853c6c0728fdbca1a8143b7a1135310f5d4a22 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9426952305a6e5d2508f41640f48027ce20cf1d07de4374fb0f671d9cd6328a7 00240743 0 0/3 2014-09-30 17:45:53 10:062:21:03:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 72489207820, "key_offsets": [ 0 ], "k_image": "b0d73aa25be59c8b0add0ebd8615f38ee69f983cffae176b0635225eb31eb0e7" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 117477 ], "k_image": "a609c8444c05baca8d182713f15cd860aefa33eb604cc8266db3e589e6a7873e" } }, { "key": { "amount": 600000000000, "key_offsets": [ 221839 ], "k_image": "cb67a4d79700b662ca7230b9f598ada9385a2aa0c2bac439605b4a13c188ae18" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 117757 ], "k_image": "dd2933f6667b7eaee76bd2da9107ea82dcee0e078e55022c95909138e68be4d1" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 118049 ], "k_image": "6ecb11b51dbf37954bdb94a833853c6c0728fdbca1a8143b7a1135310f5d4a22" } } ], "vout": [ { "amount": 33194820000, "target": { "key": "3674d424924b89610f0c973782d062948f81c6bedbe14f8d73f92632e2f997b3" } }, { "amount": 200000000000, "target": { "key": "35e09c9352f4efb0660ed75d8350cc7ec2eca61e4237d370ff79ab62d7986590" } }, { "amount": 300000000000, "target": { "key": "afb0bb9ec70e7627c50b54f433e2c155ec3c925f50d55a488f1be43971375331" } }, { "amount": 2000000000000, "target": { "key": "35a1c84a23e338a6047fe1d98be8e5bb48712840b0e8f7b4eb347f9e05b7dee6" } }, { "amount": 10000000000000, "target": { "key": "e4b2c6f8043578227a419c7da01bdf41750cb94e24a27e485d4d9bfca4b27b00" } } ], "extra": [ 2, 33, 0, 131, 101, 55, 46, 133, 84, 152, 150, 74, 83, 62, 114, 209, 20, 24, 214, 143, 157, 123, 176, 204, 7, 239, 56, 15, 52, 166, 86, 53, 230, 76, 166, 1, 32, 253, 44, 83, 56, 193, 161, 239, 115, 45, 93, 171, 238, 65, 209, 248, 220, 57, 126, 97, 83, 181, 43, 147, 204, 163, 138, 151, 166, 245, 100, 209 ], "signatures": [ "ffaa2fd211a357461c5df0f7a29ddb6d76185b5ce00ab640dc3b0ada31709b0f52d2426d9d72488ae42a4de9770d430aa2788b0f423fa684736245592781c306", "3aa9ca7443ab01b266e2e25d8a7f9f26a1fcfe8a90b4ddc3f0e6c3763d39460f49714645f63c853ed72cb64b35302de92349222a3c32a9d24c92250a49b68f06", "fa8f9c18cf98312b80aa9a1d16c2fe2b610acc81a138a2d1f65491d81225cd0a73bac767cccb16695f6bcb8fb43235fe44c2e681c7d5148408b273a430aafd08", "e94a91d0f4c42c80f9b163786da0fc1937bfc9012e15aa08e3b6cc4adcfc080640666bfd07b59caa245812992cd37d717dedddb90c7dcc8595eceeb654dfb801", "0c15a3f7bd92d3395934bca3392842927b2c3b0a4005f1db9bf0068e15dabc0a12e931b7e06bdcc82f0b57162a44c566229588218d3f098e01aa60092f7d4f0e"] }


Less details
source code | moneroexplorer