Monero Transaction 0ca2a20d7ed1012fcb1487bcdeb8d329d030175508d5a3754dac14b9a1c0a65a

Autorefresh is OFF

Tx hash: 0ca2a20d7ed1012fcb1487bcdeb8d329d030175508d5a3754dac14b9a1c0a65a

Tx prefix hash: c723e645afaf35995e57828c9c04775ddc91747b0ab53a51896b1cc367747508
Tx public key: d0a244191c7cd0f03b69b58d6c62368cd3b80cfb8c0ea7ab31a1da204762fc8c
Payment id: 50c04c00477a4d818a8b3a9746b4a542760b6c2a145e4b03ab2d45dc8e0e83a9

Transaction 0ca2a20d7ed1012fcb1487bcdeb8d329d030175508d5a3754dac14b9a1c0a65a was carried out on the Monero network on 2014-10-18 11:02:20. The transaction has 3027826 confirmations. Total output fee is 0.186010180727 XMR.

Timestamp: 1413630140 Timestamp [UTC]: 2014-10-18 11:02:20 Age [y:d:h:m:s]: 10:047:16:59:25
Block: 266066 Fee (per_kB): 0.186010180727 (0.394356987711) Tx size: 0.4717 kB
Tx version: 1 No of confirmations: 3027826 RingCT/type: no
Extra: 02210050c04c00477a4d818a8b3a9746b4a542760b6c2a145e4b03ab2d45dc8e0e83a901d0a244191c7cd0f03b69b58d6c62368cd3b80cfb8c0ea7ab31a1da204762fc8c

5 output(s) for total of 8.813989819273 xmr

stealth address amount amount idx tag
00: 128ad7212443d707c6c66b1e9300b52196f702385dbc0bebfe94bdcea4910554 0.013989819273 0 of 1 -
01: 3ca2786a57085e05f755ebd632d57df1256b6ae38110a1f08b3cc130b2b2559f 0.200000000000 568543 of 1272210 -
02: 856bb7e38e0ee49f5337624a9a42a48cd158ed6d2a085b7e994e1232ee035672 0.600000000000 241660 of 650760 -
03: cf1931780d3f018c9654b0e546645d62764b0cdb55e4dc53c02ee8d27e17c068 2.000000000000 117948 of 434057 -
04: f1b93a793f0434b7a70213ec59110bdd7c64657e834c2397ebebf18cebd41f2c 6.000000000000 85386 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-17 12:26:02 till 2014-10-17 17:50:33; resolution: 0.00 days)

  • |________________________________*_________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|

2 inputs(s) for total of 9.000000000000 xmr

key image 00: 2618d304fe96a4f01102fbf418e3266bec781189f2211d690ba6570462a5e97e amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1df6b1de811f02dc9abfaf62b0527361e3e45e5d8c0c3d02158559743cb57023 00264758 1 1/5 2014-10-17 13:26:02 10:048:14:35:43
key image 01: cd7ffa525480575a47ed8c93765fcbc9c39c1a1b5181ef8ecae01fcfe82c80eb amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c84f32f271e14b6b229db5e48f26f5b455a8a646f686f6ea017e58cae3cbbc07 00264972 1 5/4 2014-10-17 16:50:33 10:048:11:11:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3000000000000, "key_offsets": [ 90154 ], "k_image": "2618d304fe96a4f01102fbf418e3266bec781189f2211d690ba6570462a5e97e" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 85330 ], "k_image": "cd7ffa525480575a47ed8c93765fcbc9c39c1a1b5181ef8ecae01fcfe82c80eb" } } ], "vout": [ { "amount": 13989819273, "target": { "key": "128ad7212443d707c6c66b1e9300b52196f702385dbc0bebfe94bdcea4910554" } }, { "amount": 200000000000, "target": { "key": "3ca2786a57085e05f755ebd632d57df1256b6ae38110a1f08b3cc130b2b2559f" } }, { "amount": 600000000000, "target": { "key": "856bb7e38e0ee49f5337624a9a42a48cd158ed6d2a085b7e994e1232ee035672" } }, { "amount": 2000000000000, "target": { "key": "cf1931780d3f018c9654b0e546645d62764b0cdb55e4dc53c02ee8d27e17c068" } }, { "amount": 6000000000000, "target": { "key": "f1b93a793f0434b7a70213ec59110bdd7c64657e834c2397ebebf18cebd41f2c" } } ], "extra": [ 2, 33, 0, 80, 192, 76, 0, 71, 122, 77, 129, 138, 139, 58, 151, 70, 180, 165, 66, 118, 11, 108, 42, 20, 94, 75, 3, 171, 45, 69, 220, 142, 14, 131, 169, 1, 208, 162, 68, 25, 28, 124, 208, 240, 59, 105, 181, 141, 108, 98, 54, 140, 211, 184, 12, 251, 140, 14, 167, 171, 49, 161, 218, 32, 71, 98, 252, 140 ], "signatures": [ "095c5c6e28eff3a87e647782fd09595297a6c822c79837d62f3f60c219ea8f085e1fe9ab565188d9524f55ca3a15a56b20a50bcbd8a077af1697dd10a0b0240f", "a0cbb27d55ebaa72fe3a84abbc2579f3a453a413881f5e69f4adcbaedf5ac40ae4983e5312fc809a56b0d8b2c472d5c3420ab92a67e222c36988fd84f6cbbb03"] }


Less details
source code | moneroexplorer