Monero Transaction fb6df467c907de7476ffd221a69de4a598014c74a2a99cf672bd637eafe663ad

Autorefresh is OFF

Tx hash: fb6df467c907de7476ffd221a69de4a598014c74a2a99cf672bd637eafe663ad

Tx prefix hash: afc1dc0d7059f03d85225eae5485b22910952c63f957ca1d0d652e29a6a5c8c3
Tx public key: dcdd69af8dc52702b660537d257dbcca1d104014bac4a5822fc614dcd85c4d1a
Payment id: bfd4f038b9abb9083b9a685efc0f51f0e8b1a5d7f695d313b4ec4de528648c2f

Transaction fb6df467c907de7476ffd221a69de4a598014c74a2a99cf672bd637eafe663ad was carried out on the Monero network on 2014-07-01 12:41:19. The transaction has 3132929 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404218479 Timestamp [UTC]: 2014-07-01 12:41:19 Age [y:d:h:m:s]: 10:085:08:40:56
Block: 109663 Fee (per_kB): 0.010000000000 (0.025409429280) Tx size: 0.3936 kB
Tx version: 1 No of confirmations: 3132929 RingCT/type: no
Extra: 022100bfd4f038b9abb9083b9a685efc0f51f0e8b1a5d7f695d313b4ec4de528648c2f01dcdd69af8dc52702b660537d257dbcca1d104014bac4a5822fc614dcd85c4d1a

4 output(s) for total of 4.990000000000 xmr

stealth address amount amount idx tag
00: b5b823d79cae4b9035c4b73f553686ce2f53913622fc6c80c720697b39cd0b00 0.090000000000 71919 of 317822 -
01: 8b7bbe69255f5126ce8021cb986dfbe95c28671e473aa7fa9d508d9bc3fa21be 0.900000000000 40746 of 454894 -
02: 62c694dff4f7fcc974d21c2b2bdcd2e2fdb90366989f78359b3684333f169032 1.000000000000 62868 of 874629 -
03: 4bf24b1b490cafd0144badf170b8bc677ce9d3f0e3c9981306876f5906ce96e7 3.000000000000 19278 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-03 05:00:53 till 2014-07-01 12:58:43; resolution: 0.17 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 5.000000000000 xmr

key image 00: beefc1afe4766d5d71672d98d840e54267239c802b48a2d507f94496a4cadaa4 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 09628468a392dd7f62b41e2042cc5ba0683bbc93acbe40bccb963b2b891605b8 00068622 1 2/23 2014-06-03 06:00:53 10:113:15:21:22
- 01: 5869a35bd15db779a07262ed7f3e276948c41f4de27f4f51ed0cc913bf5dbee9 00109619 2 2/4 2014-07-01 11:58:43 10:085:09:23:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 3759, 25215 ], "k_image": "beefc1afe4766d5d71672d98d840e54267239c802b48a2d507f94496a4cadaa4" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "b5b823d79cae4b9035c4b73f553686ce2f53913622fc6c80c720697b39cd0b00" } }, { "amount": 900000000000, "target": { "key": "8b7bbe69255f5126ce8021cb986dfbe95c28671e473aa7fa9d508d9bc3fa21be" } }, { "amount": 1000000000000, "target": { "key": "62c694dff4f7fcc974d21c2b2bdcd2e2fdb90366989f78359b3684333f169032" } }, { "amount": 3000000000000, "target": { "key": "4bf24b1b490cafd0144badf170b8bc677ce9d3f0e3c9981306876f5906ce96e7" } } ], "extra": [ 2, 33, 0, 191, 212, 240, 56, 185, 171, 185, 8, 59, 154, 104, 94, 252, 15, 81, 240, 232, 177, 165, 215, 246, 149, 211, 19, 180, 236, 77, 229, 40, 100, 140, 47, 1, 220, 221, 105, 175, 141, 197, 39, 2, 182, 96, 83, 125, 37, 125, 188, 202, 29, 16, 64, 20, 186, 196, 165, 130, 47, 198, 20, 220, 216, 92, 77, 26 ], "signatures": [ "754cb4ff05bef1c41ea606c162c75d8413d6a9d91f105c97ce167d50b640a20c561db47a24e14ee4ffd33d2dfd9c308d53df99ce93ddfbb7842f0fd6792fae0706b46ebb739b4a209ccd8ee18529a69fd496ac0ad0bf438eea2cfc1f8a5be101ab8979cd290d424d576dde2ab1abe5ee12615dde8854f8d0d4d968187709df0e"] }


Less details
source code | moneroexplorer