Monero Transaction 04e40514fed15907432c4e3870f201319dcb8527f019ce51b14e9ef1e8837d88

Autorefresh is OFF

Tx hash: 04e40514fed15907432c4e3870f201319dcb8527f019ce51b14e9ef1e8837d88

Tx prefix hash: 9a5020d4f62c3913ff1d620fd94900563b044d1adb65f9249c7902a8c33af845
Tx public key: 42ce85a059cf4f8129da0a86cb9629e78bfcda4be2480eaf33d85aa194dd30c0
Payment id: 969dd1a5bceaf6685f243f87b67a0e73cbfafdce9d146984ba6aaa68113ad320

Transaction 04e40514fed15907432c4e3870f201319dcb8527f019ce51b14e9ef1e8837d88 was carried out on the Monero network on 2014-10-01 07:13:50. The transaction has 3063600 confirmations. Total output fee is 0.114764891759 XMR.

Timestamp: 1412147630 Timestamp [UTC]: 2014-10-01 07:13:50 Age [y:d:h:m:s]: 10:080:11:57:23
Block: 241517 Fee (per_kB): 0.114764891759 (0.145986644921) Tx size: 0.7861 kB
Tx version: 1 No of confirmations: 3063600 RingCT/type: no
Extra: 022100969dd1a5bceaf6685f243f87b67a0e73cbfafdce9d146984ba6aaa68113ad3200142ce85a059cf4f8129da0a86cb9629e78bfcda4be2480eaf33d85aa194dd30c0

5 output(s) for total of 9.485235108241 xmr

stealth address amount amount idx tag
00: ee5c6767aff0b97a8dbac8eec5095df14c08ddf02eabd3b8755193a7bc04b705 0.085235108241 0 of 1 -
01: 272bf42eaac9ebe883cb6211ef72ff1b8026a91209405b0c6f9c51cb0c9702bd 0.500000000000 352374 of 1118624 -
02: a936b952a31851d9f0edc6cbd6c4d864adf2c10f83732009ee5f8486547ce9d3 0.900000000000 131372 of 454894 -
03: 222e1a567cffd4afa893a119b54855af8b29e384b60118aa63497f6703bf28a2 2.000000000000 109607 of 434058 -
04: e81b4085f01434d0ef88dc1e866636d20c0c067ed123272794d957e8366ef6bf 6.000000000000 83456 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-29 02:49:44 till 2014-10-01 06:27:18; resolution: 0.01 days)

  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |_____________________________________________________________________________________________________________________________________________*____________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |______________________________________________________________________________________________________________________________________________________________________*___|

5 inputs(s) for total of 9.600000000000 xmr

key image 00: 2fdb6b0199b0d65680ec6878e5d91a0eee9c440dced00079e190a3d2a23030c4 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4a49345f40977fb3b037036751b539fa586189ee325dcb964e50c35cee0cbeca 00238364 1 2/4 2014-09-29 03:49:44 10:082:15:21:29
key image 01: 98f25c539fc86af1fcd8c803b21b7d32cd6ac19db6f04a55e47d7d047000f1a0 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c2744cd6a73264a2b6f6c88da3fa9b3958b541e953eafac1e6547e6141fa72d9 00241276 1 1/6 2014-10-01 03:40:59 10:080:15:30:14
key image 02: 2398b0140777c9c52aaec125fc1af264479a321ced36b7472f1a152aef920654 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 43c493defd3a4f02fd85d7472225999bc0730be0d635b950a31d260b66146147 00240983 1 1/6 2014-09-30 21:49:23 10:080:21:21:50
key image 03: 734f98e49b13802725fcdb918dd9d76d0fb48eab3800941f2ea02e09facbf85f amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 053ed4dcc88862b0c41130af992988cbd193e8a6794cbc19b431afd76ae86d30 00241309 1 1/3 2014-10-01 04:13:57 10:080:14:57:16
key image 04: be52689809b382faaf0a753ee12fe1fc90268381c8e381529a1d47cc48833580 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 45feeeb68f09c9de6d54cc1d49d4e119dabfc6bd16720848d5d48f35331d41f7 00241386 1 5/4 2014-10-01 05:27:18 10:080:13:43:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 228608 ], "k_image": "2fdb6b0199b0d65680ec6878e5d91a0eee9c440dced00079e190a3d2a23030c4" } }, { "key": { "amount": 900000000000, "key_offsets": [ 131291 ], "k_image": "98f25c539fc86af1fcd8c803b21b7d32cd6ac19db6f04a55e47d7d047000f1a0" } }, { "key": { "amount": 300000000000, "key_offsets": [ 261873 ], "k_image": "2398b0140777c9c52aaec125fc1af264479a321ced36b7472f1a152aef920654" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 109551 ], "k_image": "734f98e49b13802725fcdb918dd9d76d0fb48eab3800941f2ea02e09facbf85f" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 83448 ], "k_image": "be52689809b382faaf0a753ee12fe1fc90268381c8e381529a1d47cc48833580" } } ], "vout": [ { "amount": 85235108241, "target": { "key": "ee5c6767aff0b97a8dbac8eec5095df14c08ddf02eabd3b8755193a7bc04b705" } }, { "amount": 500000000000, "target": { "key": "272bf42eaac9ebe883cb6211ef72ff1b8026a91209405b0c6f9c51cb0c9702bd" } }, { "amount": 900000000000, "target": { "key": "a936b952a31851d9f0edc6cbd6c4d864adf2c10f83732009ee5f8486547ce9d3" } }, { "amount": 2000000000000, "target": { "key": "222e1a567cffd4afa893a119b54855af8b29e384b60118aa63497f6703bf28a2" } }, { "amount": 6000000000000, "target": { "key": "e81b4085f01434d0ef88dc1e866636d20c0c067ed123272794d957e8366ef6bf" } } ], "extra": [ 2, 33, 0, 150, 157, 209, 165, 188, 234, 246, 104, 95, 36, 63, 135, 182, 122, 14, 115, 203, 250, 253, 206, 157, 20, 105, 132, 186, 106, 170, 104, 17, 58, 211, 32, 1, 66, 206, 133, 160, 89, 207, 79, 129, 41, 218, 10, 134, 203, 150, 41, 231, 139, 252, 218, 75, 226, 72, 14, 175, 51, 216, 90, 161, 148, 221, 48, 192 ], "signatures": [ "61f85155ab429200f98ebca282b3af5253293f9102c39071feb31ba215b17b02609e7e1bddfb5c965a3f0b65275887e5aba375c5a632de0dfd78bf829abd1b08", "dd61b6a3b9f86fe38b9f38f39b7ef8af64a8bd4a50c740b7693442a5b011fc043700fe0a15cf129ed4056cda9a752cc7b98d3ae711ebb89b15f14fde066e1406", "2bc6cc61bb4881a713aa76443a2a9b7120eedf451f6972d24b11da96a3e5b502011800ddae905fef2a1062a45ec3dd7f54e3f498bdf4358275360f52c9c09c0d", "1a7d8ad11fbba8f49380c5107f4c24b7b127361f1b9dc21c917887689267e80c89cec41c0b64ce73bffc1ad15ac87be13c7b1c3e711c9724950bf6f65548420b", "050c754a97f0d8468aee6cc452a56910e662ba7419b8a4cb4412c043f640a000a86ae876abf0553144453a5aea2090718f1351a7766e7b07b1ae996eab2cab05"] }


Less details
source code | moneroexplorer