Monero Transaction fb906dd58bab206d2a2c496c5d7b11754f63fc931957fdd4d609941c3c0e4afb

Autorefresh is OFF

Tx hash: fb906dd58bab206d2a2c496c5d7b11754f63fc931957fdd4d609941c3c0e4afb

Tx prefix hash: 38adbed4ac647486656ad48a1b0a98a93faa09ec52bd9b9216a739d629579cf1
Tx public key: a748e6b91c0a095d0ec8a410b73bbba2a801cb0aaf0122e75e82884d0292c904
Payment id: d8d7d1c95d698c4fda531535376c6d908482e584f57d64a91c05fc699215d9b3

Transaction fb906dd58bab206d2a2c496c5d7b11754f63fc931957fdd4d609941c3c0e4afb was carried out on the Monero network on 2014-06-24 21:58:59. The transaction has 3178488 confirmations. Total output fee is 0.015000000000 XMR.

Timestamp: 1403647139 Timestamp [UTC]: 2014-06-24 21:58:59 Age [y:d:h:m:s]: 10:141:23:19:37
Block: 100107 Fee (per_kB): 0.015000000000 (0.028029197080) Tx size: 0.5352 kB
Tx version: 1 No of confirmations: 3178488 RingCT/type: no
Extra: 022100d8d7d1c95d698c4fda531535376c6d908482e584f57d64a91c05fc699215d9b301a748e6b91c0a095d0ec8a410b73bbba2a801cb0aaf0122e75e82884d0292c904

4 output(s) for total of 3.390000000000 xmr

stealth address amount amount idx tag
00: 4efe35d9a900d2ed45c8759df717b19b23ba833013cc661dfaf25e67d42164a7 0.090000000000 66933 of 317822 -
01: d73f180204cd50be6d9da65213170072e45bc7aab2ac9efac7320213c93af42b 0.400000000000 45726 of 688584 -
02: f276f432096666c1e6bf46db0ca89189019ec9210b540506b1ba7856615479c7 0.900000000000 28274 of 454894 -
03: b6ae6ae082540fe79a1b42a4e49e5281717338eedf9a84b85ce4e992e866c43b 2.000000000000 20857 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-08 01:01:38 till 2014-06-24 12:46:19; resolution: 0.10 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________*____________________________________________________________________________________________________________________________|

3 inputs(s) for total of 3.405000000000 xmr

key image 00: 32b55641cf793f6f1c9d490cc6e6c11853b93c1f7c2a66dd7970ab43cfc0e372 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ee381f86d4746de400aa826516021fb92fa4c043f8047d26850f063c4468b21f 00075514 1 4/5 2014-06-08 02:01:38 10:158:19:16:58
key image 01: 98705da70deb637c8ddbb6c16cdda909de9e63dbaaf9ffeef521fa2df6b32f74 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 735548fc6aba6373cb402e1e4c6da40c446b2268f229a145ccc86dc5d75cd82a 00099490 1 7/10 2014-06-24 11:46:19 10:142:09:32:17
key image 02: f4e48a7c14e8a0dc44715353d11159d3ce3f85e6103aa221f0b5a6523d5b97af amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e8f4d9b7b82c8adfff6acd4abf18322cba475020804dffb6bc6ce9b8bfa2a023 00081708 1 30/4 2014-06-12 08:13:33 10:154:13:05:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 65836 ], "k_image": "32b55641cf793f6f1c9d490cc6e6c11853b93c1f7c2a66dd7970ab43cfc0e372" } }, { "key": { "amount": 400000000000, "key_offsets": [ 45132 ], "k_image": "98705da70deb637c8ddbb6c16cdda909de9e63dbaaf9ffeef521fa2df6b32f74" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 7546 ], "k_image": "f4e48a7c14e8a0dc44715353d11159d3ce3f85e6103aa221f0b5a6523d5b97af" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "4efe35d9a900d2ed45c8759df717b19b23ba833013cc661dfaf25e67d42164a7" } }, { "amount": 400000000000, "target": { "key": "d73f180204cd50be6d9da65213170072e45bc7aab2ac9efac7320213c93af42b" } }, { "amount": 900000000000, "target": { "key": "f276f432096666c1e6bf46db0ca89189019ec9210b540506b1ba7856615479c7" } }, { "amount": 2000000000000, "target": { "key": "b6ae6ae082540fe79a1b42a4e49e5281717338eedf9a84b85ce4e992e866c43b" } } ], "extra": [ 2, 33, 0, 216, 215, 209, 201, 93, 105, 140, 79, 218, 83, 21, 53, 55, 108, 109, 144, 132, 130, 229, 132, 245, 125, 100, 169, 28, 5, 252, 105, 146, 21, 217, 179, 1, 167, 72, 230, 185, 28, 10, 9, 93, 14, 200, 164, 16, 183, 59, 187, 162, 168, 1, 203, 10, 175, 1, 34, 231, 94, 130, 136, 77, 2, 146, 201, 4 ], "signatures": [ "e0aa5277190dd1c79808c08cd11b8437e42dc8409a732fd3e7bf4ab5f6785c0e3231b9a4b56598ddb307c66726991b935fc8550a56f59b246871b9068a28ca04", "16687ccfe7bb6550f56c4e8ece95b8a140dc36a8dcb0bda5ad58168e8f4660051df382a0579fa71e97d4c231cbeba7a2f7126a2618d58a8d8a5ada297670fa05", "aadeaaf095723ca1c05e8295c86482b4b5a6c319cf4539613048b928e7a2ef0ad89e958a709e19275ed082736b373043828c37cd34e25957f6e4b74f43668f05"] }


Less details
source code | moneroexplorer