Monero Transaction 19214a9f0dd5d976f3e74d7b9a83f1ce6e91479f7ebe8ebacee0c34ac9dfaf90

Autorefresh is OFF

Tx hash: 19214a9f0dd5d976f3e74d7b9a83f1ce6e91479f7ebe8ebacee0c34ac9dfaf90

Tx prefix hash: 45e4c785032a1b45cbe8c408e24ea6ddad8c96885349fc4c4f30e5afc9e5ccd3
Tx public key: 3808db0c44953d66694111bdcedb5e7199e2e6331bbb95202f0a61b109514696
Payment id: acc68c64deb848a39634a408ee64598cd78d0e0ffeae42c784a6924c77feca7c

Transaction 19214a9f0dd5d976f3e74d7b9a83f1ce6e91479f7ebe8ebacee0c34ac9dfaf90 was carried out on the Monero network on 2016-02-24 11:32:58. The transaction has 2338467 confirmations. Total output fee is 0.037066477387 XMR.

Timestamp: 1456313578 Timestamp [UTC]: 2016-02-24 11:32:58 Age [y:d:h:m:s]: 08:303:22:03:37
Block: 969964 Fee (per_kB): 0.037066477387 (0.066010561468) Tx size: 0.5615 kB
Tx version: 1 No of confirmations: 2338467 RingCT/type: no
Extra: 022100acc68c64deb848a39634a408ee64598cd78d0e0ffeae42c784a6924c77feca7c013808db0c44953d66694111bdcedb5e7199e2e6331bbb95202f0a61b109514696

5 output(s) for total of 4.962933522613 xmr

stealth address amount amount idx tag
00: fbeda4d41faa2cf42122532a022be42fcf9fab629040eb25467f599cf024b82e 0.002933522613 0 of 1 -
01: b203e5ea2edd452931fcbea67dcb12002c9a22e42b074b921fd6feaef930c717 0.060000000000 194632 of 264760 -
02: aebbc91b3df3f9ceac6894f80c958fd62bec59f73200af94c25e7f4e004da972 0.300000000000 786229 of 976536 -
03: 0adc7d8abb6f57f9786790d19d97ec49d494f45e8780d602a245655d1f9919b5 0.600000000000 550685 of 650760 -
04: c7d5eceb816574fed989baa6faa38a6e1818eda7cb461993ceae189a96830068 4.000000000000 189940 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-24 09:29:31 till 2015-12-04 21:36:30; resolution: 2.93 days)

  • |_*_*____________________*________________________________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 5.000000000000 xmr

key image 00: 2fcdbe9c3e8a6f9d9295d69300307e2c994e185d24604dbc02beba6b16c01ed1 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 689b59d5f51d20faa00e6921fb60ec1826f4fd83aeac8cd8086f1d070e5be7a4 00142682 4 7/55 2014-07-24 10:29:31 10:153:23:07:04
- 01: a655cd9b1398c4bc62bdd1a71ccf7eda768aba985856babbcb6d6eff6c6dde89 00152319 1 7/4 2014-07-31 03:43:18 10:147:05:53:17
- 02: 04ed3c38a78f0879270428a28fd5e15190d9619000b5e3a3a1175ba0e0de168a 00243555 3 49/103 2014-10-02 17:31:18 10:083:16:05:17
- 03: 16f3f13cd2f35498409f57e0e430b68e6a10cf15d4ac179d29b8eb67bc4b2311 00854559 1 5/10 2015-12-04 20:36:30 09:020:13:00:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 69258, 11583, 35855, 76009 ], "k_image": "2fcdbe9c3e8a6f9d9295d69300307e2c994e185d24604dbc02beba6b16c01ed1" } } ], "vout": [ { "amount": 2933522613, "target": { "key": "fbeda4d41faa2cf42122532a022be42fcf9fab629040eb25467f599cf024b82e" } }, { "amount": 60000000000, "target": { "key": "b203e5ea2edd452931fcbea67dcb12002c9a22e42b074b921fd6feaef930c717" } }, { "amount": 300000000000, "target": { "key": "aebbc91b3df3f9ceac6894f80c958fd62bec59f73200af94c25e7f4e004da972" } }, { "amount": 600000000000, "target": { "key": "0adc7d8abb6f57f9786790d19d97ec49d494f45e8780d602a245655d1f9919b5" } }, { "amount": 4000000000000, "target": { "key": "c7d5eceb816574fed989baa6faa38a6e1818eda7cb461993ceae189a96830068" } } ], "extra": [ 2, 33, 0, 172, 198, 140, 100, 222, 184, 72, 163, 150, 52, 164, 8, 238, 100, 89, 140, 215, 141, 14, 15, 254, 174, 66, 199, 132, 166, 146, 76, 119, 254, 202, 124, 1, 56, 8, 219, 12, 68, 149, 61, 102, 105, 65, 17, 189, 206, 219, 94, 113, 153, 226, 230, 51, 27, 187, 149, 32, 47, 10, 97, 177, 9, 81, 70, 150 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer