Monero Transaction 1cff8e1e032e2ba0efca51e5bb551e6eb6a7dc5feb4a7ad8a451d2630f93b712

Autorefresh is OFF

Tx hash: 1cff8e1e032e2ba0efca51e5bb551e6eb6a7dc5feb4a7ad8a451d2630f93b712

Tx prefix hash: d8a21a5241d337eab2782da3fa65d82b8c6f14f0503f081f49c178c2a8e09e80
Tx public key: bf8a977c3cd05adc3218d82d660ffaf7e0ac17b600c11c7a2e7de5ce7ea84848
Payment id: 6c9472048a3bfc85b5b27e39058d576e1ac56b7686726efbcd74f93392ae029b

Transaction 1cff8e1e032e2ba0efca51e5bb551e6eb6a7dc5feb4a7ad8a451d2630f93b712 was carried out on the Monero network on 2014-12-19 17:50:44. The transaction has 2940920 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1419011444 Timestamp [UTC]: 2014-12-19 17:50:44 Age [y:d:h:m:s]: 09:353:01:08:59
Block: 354897 Fee (per_kB): 0.010000000000 (0.012704714640) Tx size: 0.7871 kB
Tx version: 1 No of confirmations: 2940920 RingCT/type: no
Extra: 0221006c9472048a3bfc85b5b27e39058d576e1ac56b7686726efbcd74f93392ae029b01bf8a977c3cd05adc3218d82d660ffaf7e0ac17b600c11c7a2e7de5ce7ea84848

5 output(s) for total of 15.050000000000 xmr

stealth address amount amount idx tag
00: 52c0071ff7e8af595cae75a375e470aca038e3360df14a04d025c8690b16fd9d 0.050000000000 132869 of 284521 -
01: 698ab23b22c9527e454799d10284475ea489bd30a5b795d324be9c846362991c 0.200000000000 689196 of 1272210 -
02: 8ba9f4fe8c1ab66652fbb33d9af7c53bc1d6b6edc1b68831a6e7b85373e42498 0.800000000000 223281 of 489955 -
03: 90d330e632a73d4b612a3e849220298bdaa3272796b83ef4982db151a20a57bc 4.000000000000 138006 of 237197 -
04: 38f3a5e88ce1179fd94fc25a13ee218f6cd50deab0a6a40fc4cb336e67efdffe 10.000000000000 411071 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-19 11:12:22 till 2014-12-19 17:20:44; resolution: 0.00 days)

  • |____________________________________________________________________________*_____________________________________________________________________________________________|
  • |____________________________*_____________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________*___________________________|
  • |________________________________________________________________________________________________________*_________________________________________________________________|
  • |_______________________________________________________________________________________________________*__________________________________________________________________|

5 inputs(s) for total of 15.060000000000 xmr

key image 00: 5413891bc42ee9b54f63535c519eddc1907433808e7620956a1c92a454d1d65d amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7cc5e1f5870d35701b006a94645c77f19ed5de3a369076e7bebbbb75679a8c36 00354643 1 2/52 2014-12-19 13:56:28 09:353:05:03:15
key image 01: ad8bf59c5da60868568afe3a44027dd6ecf00a01768c95bf9d8b706a8dea3fc9 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 758a82b25f6c96cff11f47306884b21cabc92282c9cbc4bd61f68084bfb7e608 00354495 1 5/7 2014-12-19 12:12:22 09:353:06:47:21
key image 02: a5bee9c5e12b056fb2a26a409aa1cd25a2d507392faaffc84053c1cd5883cd72 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9e0a103b00853fb964e0623454fde6c955426d38132012829d5023684efe1a98 00354817 1 5/51 2014-12-19 16:20:44 09:353:02:38:59
key image 03: ca46c1f9f99cdd1ee0acdcba9405cecbf08e85c953ecd8ac394e4d35f33050d2 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 93da711266a99b31b47d31da1093c7ec814ab2650d926f7389c0714cb1ebbf36 00354724 1 7/3 2014-12-19 14:58:08 09:353:04:01:35
key image 04: 252a65572fc0eb307cbe390961fb6bb1ace69cbde42eae547bdc146f0c714ead amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 02f2076cfee0b47cd42a5e626ca4a6c9c5b6afafd813162b6fe3eada5d5497d6 00354717 1 7/5 2014-12-19 14:56:17 09:353:04:03:26
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000000, "key_offsets": [ 64273 ], "k_image": "5413891bc42ee9b54f63535c519eddc1907433808e7620956a1c92a454d1d65d" } }, { "key": { "amount": 60000000000, "key_offsets": [ 118620 ], "k_image": "ad8bf59c5da60868568afe3a44027dd6ecf00a01768c95bf9d8b706a8dea3fc9" } }, { "key": { "amount": 600000000000, "key_offsets": [ 317806 ], "k_image": "a5bee9c5e12b056fb2a26a409aa1cd25a2d507392faaffc84053c1cd5883cd72" } }, { "key": { "amount": 400000000000, "key_offsets": [ 305710 ], "k_image": "ca46c1f9f99cdd1ee0acdcba9405cecbf08e85c953ecd8ac394e4d35f33050d2" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 64279 ], "k_image": "252a65572fc0eb307cbe390961fb6bb1ace69cbde42eae547bdc146f0c714ead" } } ], "vout": [ { "amount": 50000000000, "target": { "key": "52c0071ff7e8af595cae75a375e470aca038e3360df14a04d025c8690b16fd9d" } }, { "amount": 200000000000, "target": { "key": "698ab23b22c9527e454799d10284475ea489bd30a5b795d324be9c846362991c" } }, { "amount": 800000000000, "target": { "key": "8ba9f4fe8c1ab66652fbb33d9af7c53bc1d6b6edc1b68831a6e7b85373e42498" } }, { "amount": 4000000000000, "target": { "key": "90d330e632a73d4b612a3e849220298bdaa3272796b83ef4982db151a20a57bc" } }, { "amount": 10000000000000, "target": { "key": "38f3a5e88ce1179fd94fc25a13ee218f6cd50deab0a6a40fc4cb336e67efdffe" } } ], "extra": [ 2, 33, 0, 108, 148, 114, 4, 138, 59, 252, 133, 181, 178, 126, 57, 5, 141, 87, 110, 26, 197, 107, 118, 134, 114, 110, 251, 205, 116, 249, 51, 146, 174, 2, 155, 1, 191, 138, 151, 124, 60, 208, 90, 220, 50, 24, 216, 45, 102, 15, 250, 247, 224, 172, 23, 182, 0, 193, 28, 122, 46, 125, 229, 206, 126, 168, 72, 72 ], "signatures": [ "cca8537521b8fa6f4c3b989bd62544a58f4495eaf42d243384348e53cff49e0cbd9d4b09dab763d84297381ceabc179332b9b8f2532e3746eec67d3080c5140f", "8c0857787d5f71c76380528963f559d5987e460aa4992932dbddde6e697ca204233ff04dd5227626b1d5698544191b2ed1f61eff618da045eb05f07242e68a09", "8e4eb122f6738c3cd6039d8bce7e9ce2351442a2bf1bcb0f5cc41fbeb35173036da974841e1866eea989b210210e067deaa31e7dbc5513b203366dc6a22ad80d", "7e693d2a47e513da1feb9b3e25d9c05f19679b16906490192674755896f6b7071e09f9b86f33cae5249e9470740a5dfbb65065c67c7a4f72bbac5a48fd772d02", "31a41d47ce9bdec697631d828261d658ddce1d5081456faccfbe488777fe4b0b19d27426451765e755eeea4824cab30052e1337ffd6f1e5bc93f4f781388b40a"] }


Less details
source code | moneroexplorer