Monero Transaction 14b8bf1d10783396dafc28417da4c074446625a7cdb5db5803565c87213736a6

Autorefresh is OFF

Tx hash: 14b8bf1d10783396dafc28417da4c074446625a7cdb5db5803565c87213736a6

Tx prefix hash: 4c4807d4263ca0933d98d045dfa21139b968a6db7e6445a920418c87ddc32254
Tx public key: ede28e476d032939bcaa17289660af619f1f0582beebe45d8e8e6b6546aebaff
Payment id: 861357346e6416e1212e660a7b2a90e529e2376ff26a5a2074cf3abe78bd4e77

Transaction 14b8bf1d10783396dafc28417da4c074446625a7cdb5db5803565c87213736a6 was carried out on the Monero network on 2014-08-04 07:09:51. The transaction has 3120099 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1407136191 Timestamp [UTC]: 2014-08-04 07:09:51 Age [y:d:h:m:s]: 10:101:08:58:56
Block: 158335 Fee (per_kB): 0.005000000000 (0.005638766520) Tx size: 0.8867 kB
Tx version: 1 No of confirmations: 3120099 RingCT/type: no
Extra: 022100861357346e6416e1212e660a7b2a90e529e2376ff26a5a2074cf3abe78bd4e7701ede28e476d032939bcaa17289660af619f1f0582beebe45d8e8e6b6546aebaff

5 output(s) for total of 1.195000000000 xmr

stealth address amount amount idx tag
00: c04339c371ddb575a663ae3c365114d8a028eabcde930fa7e973e52c06d2494c 0.005000000000 202125 of 308584 -
01: 833f6c8bceac1086d291d35733d56f3c3bfd43e43ce28d94b994c0d222b98cd8 0.010000000000 324146 of 502466 -
02: a1bd41dd209ce50c8059c50dd0a7bb247511e30021861ae7ddf8082faecdec97 0.080000000000 87171 of 269576 -
03: babc9697ff7967cdfc2f26eccd0a334fef808865b319e3f8962adffcfa791749 0.100000000000 368222 of 982315 -
04: 45246dd0c3dfaddf7693d56ad924a5a67c305e938199c30229667db01eafae40 1.000000000000 164056 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-03 08:34:48 till 2014-08-04 05:34:18; resolution: 0.01 days)

  • |___________________________________________*______________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________*________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |________________________________________________________________________________________________________________________________*_________________________________________|
  • |_________*________________________________________________________________________________________________________________________________________________________________|

6 inputs(s) for total of 1.200000000000 xmr

key image 00: f4a98e0634b972df825db05295dc0a2c6b5f495375876fd5742ffa2281c52e9c amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 66326a6a79a6b2d3b9435e45a20652f1574fffc429af8d4b78c92d8a0a5755b3 00157307 4 3/25 2014-08-03 13:53:29 10:102:02:15:18
key image 01: c5a631dae35b31130af1e214957d2fbc0285afa8f0e1cdd0de910ecc88445556 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cf1d8e1e178d30acab1a6f6ac241acde2f558c2dc4248b5ad313c3cdccb75fdc 00157804 4 11/35 2014-08-03 22:36:05 10:101:17:32:42
key image 02: b61fa50fe25032ac634bfb9ce258ed2cc758803d2b58cb5fecf52e52b0a6d0af amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 56e6b09bd0aef79e3a6ec844de9deaff7af47ae1335263d5f95304284077a503 00157623 4 2/34 2014-08-03 19:26:42 10:101:20:42:05
key image 03: 19af3346c2efdd5e50a101b9d564b57b9aa6004af7beee92418c50129a6471c7 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 66b23285b13b658865d279b159017fb33a695a49ca0babf080a9d6160d05ea0a 00158168 4 5/31 2014-08-04 04:34:18 10:101:11:34:29
key image 04: 63d3e7e68f0d7b8c7846d43d961222aa8cfb987f087ac91b5e42fe07afcba45a amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b46b3f949e2917b7a22d8d2acba900e12fd11277cd1ed4baa92bc25206009c06 00157892 4 14/56 2014-08-04 00:25:39 10:101:15:43:08
key image 05: 87c3682b7c09bdf455aa267f6fa374d75d3eb01e8d878bdd6217a3fa6d399000 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba9732bc40730f088f23a8762a0faa4d9b4d8219fc318ee47cf21c387dec6172 00157041 4 12/56 2014-08-03 09:34:48 10:102:06:33:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 312438 ], "k_image": "f4a98e0634b972df825db05295dc0a2c6b5f495375876fd5742ffa2281c52e9c" } }, { "key": { "amount": 200000000000, "key_offsets": [ 314394 ], "k_image": "c5a631dae35b31130af1e214957d2fbc0285afa8f0e1cdd0de910ecc88445556" } }, { "key": { "amount": 200000000000, "key_offsets": [ 313762 ], "k_image": "b61fa50fe25032ac634bfb9ce258ed2cc758803d2b58cb5fecf52e52b0a6d0af" } }, { "key": { "amount": 200000000000, "key_offsets": [ 315444 ], "k_image": "19af3346c2efdd5e50a101b9d564b57b9aa6004af7beee92418c50129a6471c7" } }, { "key": { "amount": 200000000000, "key_offsets": [ 314718 ], "k_image": "63d3e7e68f0d7b8c7846d43d961222aa8cfb987f087ac91b5e42fe07afcba45a" } }, { "key": { "amount": 200000000000, "key_offsets": [ 311530 ], "k_image": "87c3682b7c09bdf455aa267f6fa374d75d3eb01e8d878bdd6217a3fa6d399000" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "c04339c371ddb575a663ae3c365114d8a028eabcde930fa7e973e52c06d2494c" } }, { "amount": 10000000000, "target": { "key": "833f6c8bceac1086d291d35733d56f3c3bfd43e43ce28d94b994c0d222b98cd8" } }, { "amount": 80000000000, "target": { "key": "a1bd41dd209ce50c8059c50dd0a7bb247511e30021861ae7ddf8082faecdec97" } }, { "amount": 100000000000, "target": { "key": "babc9697ff7967cdfc2f26eccd0a334fef808865b319e3f8962adffcfa791749" } }, { "amount": 1000000000000, "target": { "key": "45246dd0c3dfaddf7693d56ad924a5a67c305e938199c30229667db01eafae40" } } ], "extra": [ 2, 33, 0, 134, 19, 87, 52, 110, 100, 22, 225, 33, 46, 102, 10, 123, 42, 144, 229, 41, 226, 55, 111, 242, 106, 90, 32, 116, 207, 58, 190, 120, 189, 78, 119, 1, 237, 226, 142, 71, 109, 3, 41, 57, 188, 170, 23, 40, 150, 96, 175, 97, 159, 31, 5, 130, 190, 235, 228, 93, 142, 142, 107, 101, 70, 174, 186, 255 ], "signatures": [ "afc5eac87954f0c4c1139c5393141622fb3898180fb20c295188ad1ebfd0d10e5c35328606c0ea2868868d5cc2945b8fe82083401abddb5ea62d3ba06e89930f", "f698e9e7c1ffbbe0d7fbff3153661956a0c527241d60861debe6f59cbf152c096220c345a7157f28e846dd6fbdf5d8c9f34fccf6787edacb317fa4462842aa07", "a8ab76d9d949763ba5da2525d21b7ba0e689e1501655fa0114e9c044adb986034213fa28f8236d25fa53d162e9e2e952fa76a70f44604f313014e5818864ea04", "de13cd2dbbfcb949ed6f94e8e025c2f1236c4cdc607931b7a9e5ac8f2bf2e404ec9b13c0eb3f41c968004d20851a2d9d1e5d239279386247863dd108e188800d", "6dd62995ce8a9dd4bdf5ae60032a3b025462d7e9cf42f8ba703fd2c5e118bb0b1323bdfe8c9d0080dd2788cea3d544fc7e72c6976176364b503d3ba8d4c5be07", "f6672dc7ee7288e8c1704951ff471c0a6b4e203284e75bb27ddac07572593d0b24f11828442bdba7771cab97210936053b2415f733fca4fc357f9f77c45dbd02"] }


Less details
source code | moneroexplorer