Monero Transaction 0c0ddd71ba413857a1eaaca5fee911e9872aaf45232961e8ccd913bf8e3be5af

Autorefresh is OFF

Tx hash: 0c0ddd71ba413857a1eaaca5fee911e9872aaf45232961e8ccd913bf8e3be5af

Tx prefix hash: 9672af7f896ca6a6781a14bd62f0bebad41ae2e2717a423f8e62a847fdc23b61
Tx public key: 731b5d450055469aa4e61b4f33711c6a3a7af59776f20d10eeb0b2468d496d57
Payment id: 5c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088

Transaction 0c0ddd71ba413857a1eaaca5fee911e9872aaf45232961e8ccd913bf8e3be5af was carried out on the Monero network on 2014-07-24 21:21:31. The transaction has 3148241 confirmations. Total output fee is 0.006131600000 XMR.

Timestamp: 1406236891 Timestamp [UTC]: 2014-07-24 21:21:31 Age [y:d:h:m:s]: 10:130:00:38:58
Block: 143323 Fee (per_kB): 0.006131600000 (0.006266225948) Tx size: 0.9785 kB
Tx version: 1 No of confirmations: 3148241 RingCT/type: no
Extra: 0221005c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb908801731b5d450055469aa4e61b4f33711c6a3a7af59776f20d10eeb0b2468d496d57

6 output(s) for total of 8.193868400000 xmr

stealth address amount amount idx tag
00: a14ffd264ee963f6bf2eef934feb56c7ad476a2315447763dcaf6a332e641ce8 0.003868400000 0 of 2 -
01: 9e28e2bbad1a51a8960edeeaad652907d20ae4a8ea7279a42d81e9ddcf372a6e 0.030000000000 151862 of 324336 -
02: 24bd9dd8cf627e9e059ba6da613098449df7a6f946d95c374a948f519354c1bc 0.060000000000 95338 of 264760 -
03: 9bf46b5783adf5a8dea41671d2123d93dfae29486e150944eb0608c22713b081 0.100000000000 315979 of 982315 -
04: 0b993784bcab662c7137724007a48e9edd5fbd52738670049ed54b610f03b08c 3.000000000000 33659 of 300495 -
05: 3cc7367ef2757c6c62514729563f667e15635b356c239fdded2ff2a1425fadf1 5.000000000000 69996 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-16 12:15:19 till 2014-07-24 22:00:00; resolution: 0.23 days)

  • |_____________________________________________________________________________________________________________*___________________________________________________________*|
  • |______________________________*__________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________*_____________________________________________________________________________________________*|

4 inputs(s) for total of 8.200000000000 xmr

key image 00: 55e3ce409d0dd4f80839695f823cb56f1c1bb487295a85af2d26b58e4f3e9330 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 03a80665f70213adfa7c6d698b6637a35767ee9bfa4c3f2a90598b9d9787a8b3 00123387 1 11/64 2014-07-11 02:01:28 10:143:19:59:01
- 01: 842c67961dbfca9a1cb469c8a926644c08d91c6fd222e6c08651881fd3e82997 00143305 2 1/7 2014-07-24 20:58:10 10:130:01:02:19
key image 01: 3d876dc001fd810993cbf7491b8ba4e64404409869a0063d70124ab19b59e013 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a9e910ed9835d161d654becb2dbc127c64e4a031f81b59d4bf8fb154213b6ad9 00097583 1 6/46 2014-06-23 03:16:20 10:161:18:44:09
- 01: 04fb4cb54b09ab9458da351404199cc5f40c9cc88935a8cee064ab241c2734d3 00143309 2 5/9 2014-07-24 21:00:00 10:130:01:00:29
key image 02: d0113e00f49b196a0ef7887558062cff22a76fa8ddd439e33e6a99e97abdf923 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: abd2dc5bd1f54c57595d7da1803d372a0dafa7be6db666c3f9ad08e73e62fca7 00087911 1 9/4 2014-06-16 13:15:19 10:168:08:45:10
- 01: 55768251d137ff243b073d10f243554858a3a615602d8523ad988948450dc61d 00143282 2 2/9 2014-07-24 20:35:34 10:130:01:24:55
key image 03: 6c381199f33911e86688f142811313bfd09e752064dcbb2124cf78cd1b3c74ad amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5d07e59d47d993879f0be8b3492ad5d3f3b3fdb0bce87b9efec66dd807411154 00112251 0 0/5 2014-07-03 08:08:10 10:151:13:52:19
- 01: cc039487ecfaf9f2c8163fb98a4a6184a0bc3645cc33e1a01596c9b78803cc9e 00143228 0 0/6 2014-07-24 19:36:27 10:130:02:24:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 72587, 34045 ], "k_image": "55e3ce409d0dd4f80839695f823cb56f1c1bb487295a85af2d26b58e4f3e9330" } }, { "key": { "amount": 600000000000, "key_offsets": [ 31188, 75445 ], "k_image": "3d876dc001fd810993cbf7491b8ba4e64404409869a0063d70124ab19b59e013" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 13325, 39297 ], "k_image": "d0113e00f49b196a0ef7887558062cff22a76fa8ddd439e33e6a99e97abdf923" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 32341, 37549 ], "k_image": "6c381199f33911e86688f142811313bfd09e752064dcbb2124cf78cd1b3c74ad" } } ], "vout": [ { "amount": 3868400000, "target": { "key": "a14ffd264ee963f6bf2eef934feb56c7ad476a2315447763dcaf6a332e641ce8" } }, { "amount": 30000000000, "target": { "key": "9e28e2bbad1a51a8960edeeaad652907d20ae4a8ea7279a42d81e9ddcf372a6e" } }, { "amount": 60000000000, "target": { "key": "24bd9dd8cf627e9e059ba6da613098449df7a6f946d95c374a948f519354c1bc" } }, { "amount": 100000000000, "target": { "key": "9bf46b5783adf5a8dea41671d2123d93dfae29486e150944eb0608c22713b081" } }, { "amount": 3000000000000, "target": { "key": "0b993784bcab662c7137724007a48e9edd5fbd52738670049ed54b610f03b08c" } }, { "amount": 5000000000000, "target": { "key": "3cc7367ef2757c6c62514729563f667e15635b356c239fdded2ff2a1425fadf1" } } ], "extra": [ 2, 33, 0, 92, 130, 252, 227, 186, 20, 184, 186, 21, 180, 186, 68, 116, 221, 225, 104, 37, 34, 201, 14, 86, 99, 94, 171, 43, 78, 82, 14, 26, 235, 144, 136, 1, 115, 27, 93, 69, 0, 85, 70, 154, 164, 230, 27, 79, 51, 113, 28, 106, 58, 122, 245, 151, 118, 242, 13, 16, 238, 176, 178, 70, 141, 73, 109, 87 ], "signatures": [ "f62cc2b2b716b8f1a6c5a756b6a1f2990b43f30878dc620f5808128b76f3ec027923303b82f5c9f0bb23026c83099d24af36d0fe76efb88fc400d5f03323a20e096d9e7bed7ab2160d1bebed03d40881eaa02f2637eaa2dea41c17485052620df11c926b1ea62f16dd03015b0ad1bae6ce08a07d6c6ad89b7bbad96750cc620b", "2f8051efe762d48e237a8dc4b8918ce8f8384a7f33e70fff3aa007a5ad86770d6f5c184c41a066b194bc413a3af2dfdd6516ba12483384d36fab498bb3ffe9089bb01efffa9c1c4a28a11bc6ba71c87235fa3b1c3e11087a45d9b033596e110677042a285e3b2ba6b92d5094225aa3e65b79e75dc9afd819c980d3ef907b5f08", "c1fd8afb26c7923b3f59e58ea6277328849e81fbbf220703e2f2026ec831e80f4f3c669075cedec299626167c1188dc3797aff790891124ea0f4effc946e870592f936441de323916eb6e3b9487a9c7b3187b4d1534949cdec9fa85c20a18b02a30086eeab5bd94a62dc212a4dd812d8d1dc0925e49ca5eb975e87de86197403", "7e67ab8fa6c6b8ce9d2184f59d99ea4ac224ad270b69eec4fdeebf9d81fc370554a5bc24eeb1d56f26a54715faeacd28983b800f04ccbcf8432d1d84c21ea507cfec311179daa5382d20e73067d1e1a322b727e783f1d4014a787ca8ef60db076b818598ae4caf53283282637e88eac8c22f41fdd49ed816ae05d4134216680a"] }


Less details
source code | moneroexplorer