Monero Transaction 138ff760c1775b0d8ebba90a6bc9acd22b66cadeab26f7782cf4d6d0a72e06aa

Autorefresh is OFF

Tx hash: 138ff760c1775b0d8ebba90a6bc9acd22b66cadeab26f7782cf4d6d0a72e06aa

Tx prefix hash: b0691f11861d5aa938bd1d91ad9e89eff17d17c14bdc6a068de7c588b998ee8b
Tx public key: 02e829d400623af72cdd18747f3f61583e0d6b7bbdee49ca78332bf04fcb8a6d
Payment id: 6cd25d61cdd7b9916391f05cadf3fe7c57377873da01623e175bf7d7a7ba37cc

Transaction 138ff760c1775b0d8ebba90a6bc9acd22b66cadeab26f7782cf4d6d0a72e06aa was carried out on the Monero network on 2014-11-04 07:47:40. The transaction has 3012459 confirmations. Total output fee is 0.155293224170 XMR.

Timestamp: 1415087260 Timestamp [UTC]: 2014-11-04 07:47:40 Age [y:d:h:m:s]: 10:042:20:17:43
Block: 290029 Fee (per_kB): 0.155293224170 (0.470474146598) Tx size: 0.3301 kB
Tx version: 1 No of confirmations: 3012459 RingCT/type: no
Extra: 0221006cd25d61cdd7b9916391f05cadf3fe7c57377873da01623e175bf7d7a7ba37cc0102e829d400623af72cdd18747f3f61583e0d6b7bbdee49ca78332bf04fcb8a6d

4 output(s) for total of 8.844706775830 xmr

stealth address amount amount idx tag
00: b91221a0c0f06804f1b8eddbeaecb90ac10c125ff5194e200a2c4da73f29eda0 0.044706775830 0 of 1 -
01: 8d817617e7226dcb30fa1d3b1f87901cdaca6e7fcc5f0840bc83c27e259c84c3 0.300000000000 313047 of 976536 -
02: f2134f9a67373b070d215315cee500e1f7308289440f0b04b4750be81ed45990 0.500000000000 431780 of 1118624 -
03: b0d3b47b023131cf2748fded08902a9c9efd50476a8f6be05793a62eb32a1147 8.000000000000 22927 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-03 12:11:09 till 2014-11-03 14:11:09; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 9.000000000000 xmr

key image 00: 124a7b4cf7f904c651a2602410792f0539a3df814645f8fc715066e3e15fcac6 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 050f1540c09497495d38076605cc5ad8c26eb8fa352bb142b131fc35863a7107 00288970 1 2/5 2014-11-03 13:11:09 10:043:14:54:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000000, "key_offsets": [ 25057 ], "k_image": "124a7b4cf7f904c651a2602410792f0539a3df814645f8fc715066e3e15fcac6" } } ], "vout": [ { "amount": 44706775830, "target": { "key": "b91221a0c0f06804f1b8eddbeaecb90ac10c125ff5194e200a2c4da73f29eda0" } }, { "amount": 300000000000, "target": { "key": "8d817617e7226dcb30fa1d3b1f87901cdaca6e7fcc5f0840bc83c27e259c84c3" } }, { "amount": 500000000000, "target": { "key": "f2134f9a67373b070d215315cee500e1f7308289440f0b04b4750be81ed45990" } }, { "amount": 8000000000000, "target": { "key": "b0d3b47b023131cf2748fded08902a9c9efd50476a8f6be05793a62eb32a1147" } } ], "extra": [ 2, 33, 0, 108, 210, 93, 97, 205, 215, 185, 145, 99, 145, 240, 92, 173, 243, 254, 124, 87, 55, 120, 115, 218, 1, 98, 62, 23, 91, 247, 215, 167, 186, 55, 204, 1, 2, 232, 41, 212, 0, 98, 58, 247, 44, 221, 24, 116, 127, 63, 97, 88, 62, 13, 107, 123, 189, 238, 73, 202, 120, 51, 43, 240, 79, 203, 138, 109 ], "signatures": [ "96c2592db011766caf0be383a56d5b502b6ada3b61ebef5e8e2573dfc6b9460e29aaf9ee21baa3a1ee1dbf8297abd6dee7e90a00a7eda4c4144ab14f0e3acb0d"] }


Less details
source code | moneroexplorer