Monero Transaction 02089c2eab3e6d82396fe49fb48429bddddd2ba2660222291ff255045edc78e8

Autorefresh is OFF

Tx hash: 02089c2eab3e6d82396fe49fb48429bddddd2ba2660222291ff255045edc78e8

Tx prefix hash: fe071d502b1ffe598e15de550566bc54a58add679cca84a7282389378cca3a77
Tx public key: 0f18d38395d1ea369b008a5a8a60d465c32fb27e694b4ac5a09b9b5a605ecc8b
Payment id: 17039cd156402df9a2a735fa25d75fff861c86287626b65fb8673d1fa7a9b3e9

Transaction 02089c2eab3e6d82396fe49fb48429bddddd2ba2660222291ff255045edc78e8 was carried out on the Monero network on 2014-12-29 16:04:10. The transaction has 2925114 confirmations. Total output fee is 0.010000000001 XMR.

Timestamp: 1419869050 Timestamp [UTC]: 2014-12-29 16:04:10 Age [y:d:h:m:s]: 09:340:20:36:11
Block: 369057 Fee (per_kB): 0.010000000001 (0.015329341319) Tx size: 0.6523 kB
Tx version: 1 No of confirmations: 2925114 RingCT/type: no
Extra: 02210017039cd156402df9a2a735fa25d75fff861c86287626b65fb8673d1fa7a9b3e9010f18d38395d1ea369b008a5a8a60d465c32fb27e694b4ac5a09b9b5a605ecc8b

7 output(s) for total of 12.389999999999 xmr

stealth address amount amount idx tag
00: ee28424ad3ad8a9e6f6042257d27329a916a70e7fe583a1c411dbd9d8e9da777 0.009999999999 186 of 1180 -
01: 6e272a5ee5c65eabe4d37afaef1d3dfcb8334f217dc61562959a97a62821d07d 0.090000000000 128894 of 317822 -
02: c76f94820cc3fe6f41eb5b80998aecef1713e1a3db74c871c6afa94202483f36 0.090000000000 128895 of 317822 -
03: 2db6fc90bce9bf53dde87c9111e642cc6ef1c13a88e34344c8451e621fed7e4b 0.100000000000 682790 of 982315 -
04: 21e027448c504a3af706cbf970b8d20dbfcbf73aae2493f8e25de7b5c913b3e8 0.100000000000 682791 of 982315 -
05: 9696f4c53d13e4bd5f28735d57286ff7bb7829a9d54976c72c50ab1efc0e1c63 4.000000000000 139736 of 237197 -
06: 98a331b76ef910297471043c629a08c21c01a7e747b2e1bbe6bbf15b2cce876f 8.000000000000 28076 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-29 04:45:01 till 2014-12-29 09:05:14; resolution: 0.00 days)

  • |_______________________________________*__________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________*______________________________________|
  • |__________________________________________________*_______________________________________________________________________________________________________________________|

3 inputs(s) for total of 12.400000000000 xmr

key image 00: f60730e9f3817e98902b69bd02eedf1c577bfc93cd075a572b7ccc58c753ccba amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0e8680de0bbdf0a9e06b7b307b76f20b925adf2ccd32d9468138adcf34714c0c 00368340 0 0/4 2014-12-29 05:45:01 09:341:06:55:20
key image 01: 124381787a811476d3ce76d41bcd4eb48e3f7c834457dc84ba2885aff7d4347c amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01116537873edf747ea9acde5a46f6aaa20e8e690053ac92efbf08828a1aa85c 00368462 0 0/4 2014-12-29 08:05:14 09:341:04:35:07
key image 02: 286a885067bb9dd039bd5f8e696a37b02583ce7fb3144fb5e355f7676c353817 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a553c90b9bb2888840cdd41370e97dcc05f548f5ff9aecfaf09dcd5bc4aa4c83 00368355 0 0/4 2014-12-29 06:01:16 09:341:06:39:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 318569 ], "k_image": "f60730e9f3817e98902b69bd02eedf1c577bfc93cd075a572b7ccc58c753ccba" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 191873 ], "k_image": "124381787a811476d3ce76d41bcd4eb48e3f7c834457dc84ba2885aff7d4347c" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 426551 ], "k_image": "286a885067bb9dd039bd5f8e696a37b02583ce7fb3144fb5e355f7676c353817" } } ], "vout": [ { "amount": 9999999999, "target": { "key": "ee28424ad3ad8a9e6f6042257d27329a916a70e7fe583a1c411dbd9d8e9da777" } }, { "amount": 90000000000, "target": { "key": "6e272a5ee5c65eabe4d37afaef1d3dfcb8334f217dc61562959a97a62821d07d" } }, { "amount": 90000000000, "target": { "key": "c76f94820cc3fe6f41eb5b80998aecef1713e1a3db74c871c6afa94202483f36" } }, { "amount": 100000000000, "target": { "key": "2db6fc90bce9bf53dde87c9111e642cc6ef1c13a88e34344c8451e621fed7e4b" } }, { "amount": 100000000000, "target": { "key": "21e027448c504a3af706cbf970b8d20dbfcbf73aae2493f8e25de7b5c913b3e8" } }, { "amount": 4000000000000, "target": { "key": "9696f4c53d13e4bd5f28735d57286ff7bb7829a9d54976c72c50ab1efc0e1c63" } }, { "amount": 8000000000000, "target": { "key": "98a331b76ef910297471043c629a08c21c01a7e747b2e1bbe6bbf15b2cce876f" } } ], "extra": [ 2, 33, 0, 23, 3, 156, 209, 86, 64, 45, 249, 162, 167, 53, 250, 37, 215, 95, 255, 134, 28, 134, 40, 118, 38, 182, 95, 184, 103, 61, 31, 167, 169, 179, 233, 1, 15, 24, 211, 131, 149, 209, 234, 54, 155, 0, 138, 90, 138, 96, 212, 101, 195, 47, 178, 126, 105, 75, 74, 197, 160, 155, 155, 90, 96, 94, 204, 139 ], "signatures": [ "dd09f4577f168f3537dcda0f733eb0d4b7d3a6ea6e8b77e27d6955d79d15c206e178a55958c58e48fb75f9653811510d1d9b0c1fe5c5cda1094bb77f3cbbbb06", "543a63ea545eefa8f3ace639d714ba914c4e9c560218847ff94857db3a2df60b3d1f113b79caf8e1f2aaea8c4f82838794e603039b16b9053244baa7fbf65504", "b398bc26e863fdf7935a51233c8a3432c5e8e15859e94a45589ab7f377fb8e0c15e398632272b6a0d6efd3e8aba5a56e87acb2e71b48ba0a77c214f85f469500"] }


Less details
source code | moneroexplorer