Monero Transaction fb61e2fdd50bcef663ee068830df469ce653db30ed7a94ef51c5fd36561c4f30

Autorefresh is OFF

Tx hash: fb61e2fdd50bcef663ee068830df469ce653db30ed7a94ef51c5fd36561c4f30

Tx prefix hash: eaaa55949d46363d05eabdaeeb9edb2e85a74f78e1fa0542f09a649e3f93d20d
Tx public key: f9070ca49571171b10a724e478a23e1f0cf52691e8ea69c839bbcda9067728a9
Payment id: 5865153222ff8ad7b5caf9f7c0bc188398cd91e36798ba0bc7db023344b9e43d

Transaction fb61e2fdd50bcef663ee068830df469ce653db30ed7a94ef51c5fd36561c4f30 was carried out on the Monero network on 2014-06-16 01:38:27. The transaction has 3193092 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1402882707 Timestamp [UTC]: 2014-06-16 01:38:27 Age [y:d:h:m:s]: 10:153:01:42:41
Block: 87072 Fee (per_kB): 0.005000000000 (0.015802469136) Tx size: 0.3164 kB
Tx version: 1 No of confirmations: 3193092 RingCT/type: no
Extra: 0221005865153222ff8ad7b5caf9f7c0bc188398cd91e36798ba0bc7db023344b9e43d01f9070ca49571171b10a724e478a23e1f0cf52691e8ea69c839bbcda9067728a9

1 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: 1160231f826642cd875e8d60f44cda3f07081120b8c5de2f0436907237e0b286 1.000000000000 24623 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-08 18:08:55 till 2014-06-10 17:43:50; resolution: 0.01 days)

  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|

2 inputs(s) for total of 1.005000000000 xmr

key image 00: f0b7bbcf4d74b7c7fa840ad3d316a4811dcc3d4a3e9b3a3b74eb879835f83f9e amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 718835203ce4b433d59d53e15189c5c43ce399fd583da2e49956600f45ddd8f5 00076536 1 4/76 2014-06-08 19:08:55 10:160:08:12:13
key image 01: db8d3732d457a6b550ebfb1bf50e053af3f2e713bdec2f115fe67ded1f71911e amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 957976a7bfe94a32e6701392a83a2740a7e0d2ca9e1d68ff0929ad405871155f 00079263 1 8/87 2014-06-10 16:43:50 10:158:10:37:18
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 70714 ], "k_image": "f0b7bbcf4d74b7c7fa840ad3d316a4811dcc3d4a3e9b3a3b74eb879835f83f9e" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 16145 ], "k_image": "db8d3732d457a6b550ebfb1bf50e053af3f2e713bdec2f115fe67ded1f71911e" } } ], "vout": [ { "amount": 1000000000000, "target": { "key": "1160231f826642cd875e8d60f44cda3f07081120b8c5de2f0436907237e0b286" } } ], "extra": [ 2, 33, 0, 88, 101, 21, 50, 34, 255, 138, 215, 181, 202, 249, 247, 192, 188, 24, 131, 152, 205, 145, 227, 103, 152, 186, 11, 199, 219, 2, 51, 68, 185, 228, 61, 1, 249, 7, 12, 164, 149, 113, 23, 27, 16, 167, 36, 228, 120, 162, 62, 31, 12, 245, 38, 145, 232, 234, 105, 200, 57, 187, 205, 169, 6, 119, 40, 169 ], "signatures": [ "44389f311eef98299dcf6b39de5d62304ddd031c34fd4898ccf0363b06de0d0574ff283176d04471ebe5264d13b66f09c56a325ed0862f89e9819d23f7333303", "ee7ee66d86e413493264e2fa37ba5d1bb26431355945172e85c2a5fb207e050788456a9948ce3e15838106875b0f313464ab0902796b1ba1b792ebf96aa4fd08"] }


Less details
source code | moneroexplorer