Monero Transaction 1d1fb034bae28c57d03331d2eab29bc56ba9fac560b688a795b089d0ab772377

Autorefresh is OFF

Tx hash: 1d1fb034bae28c57d03331d2eab29bc56ba9fac560b688a795b089d0ab772377

Tx prefix hash: a02df527ef7fd74ea3d19ffbc11ea14c33d2c70f99284f140d9a90d1f4ce02ec
Tx public key: da2be2565683007c2b84a3d7f2948dc1ca627f1609316044a7c228abf33a6739

Transaction 1d1fb034bae28c57d03331d2eab29bc56ba9fac560b688a795b089d0ab772377 was carried out on the Monero network on 2014-06-27 04:05:11. The transaction has 3175049 confirmations. Total output fee is 0.005130933338 XMR.

Timestamp: 1403841911 Timestamp [UTC]: 2014-06-27 04:05:11 Age [y:d:h:m:s]: 10:139:08:50:07
Block: 103293 Fee (per_kB): 0.005130933338 (0.005883623447) Tx size: 0.8721 kB
Tx version: 1 No of confirmations: 3175049 RingCT/type: no
Extra: 01da2be2565683007c2b84a3d7f2948dc1ca627f1609316044a7c228abf33a6739

11 output(s) for total of 10.946000000000 xmr

stealth address amount amount idx tag
00: 6b8616330a3ecca7b65ada7fb79d7fba456f9127a0bb1d41a949913f4eb6c65a 0.006000000000 166050 of 256624 -
01: 58a92d370733d31faddbc1ec6184371798f78fdf45eecbc9ef76f1b063cb8bbb 0.040000000000 115136 of 294095 -
02: 0b63c40fc24086eb304fc5f2db964ed2b1898671ac46d4af3091a5a60f0552e0 0.200000000000 96228 of 1272210 -
03: dc0dd0eb94709042af100f9add697c2edf8f00210dc457d12e7c3e91a7176805 0.200000000000 96229 of 1272210 -
04: ffcfbe30c52a368b05680f0260943bd1296d0bfff86eec50562722248b9f59c8 0.200000000000 96230 of 1272210 -
05: 8baeb98b94468b9ce763cf119be0da5e26128cefa975f22955d335ea735ecd84 0.300000000000 63631 of 976536 -
06: 46956031529fd677cf863a7cd77bfc2e9212a6f5aad49374561253bba0891086 0.400000000000 49326 of 688584 -
07: 3166f55289b65b667cf102a2d4c60a623555fcceac9f58b5a08593034eb7d637 0.700000000000 34278 of 514466 -
08: 179f0ffa95670555ce180cfe4af12f761728bfd8a52c4967ead7554e920a3b89 0.900000000000 31646 of 454894 -
09: ad1d2099e760945654b313e24d2725c6e8f2daa3ee8c9e7b4edcec7df0c6990e 1.000000000000 50744 of 874629 -
10: 396b9a96cab2d85bb91866165b19976365d601d0e952e1558388edaa70215cc8 7.000000000000 41832 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-26 03:47:32 till 2014-06-26 22:21:34; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|

4 inputs(s) for total of 10.951130933338 xmr

key image 00: a12d966847e8b2dcbe1a669562409d3577830d7a51d0a1fce9e7ad039c4e8996 amount: 0.001130933338
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 00eb3a8e9febe72833b24ee05dfc9a66bb68571044a044aa431e4ec7a014e0d5 00102951 0 0/5 2014-06-26 21:21:34 10:139:15:33:44
key image 01: cf10a526516c6747be02c0a48e8a0321843b6f3a6e2134e2baa1528acc74a143 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f94e1b84298f4f80325a938dd67db4e4a07c54ef2b48eb83cfa2c6f3e496bcae 00102951 0 0/5 2014-06-26 21:21:34 10:139:15:33:44
key image 02: 464a05e5cce795bfae18eec75186cc74ff4b63588cabee3305cb1d9472be3692 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 91da58eca274491be4def697cae44e0168b284b33c0644a92c353c58125aac7b 00101929 1 5/19 2014-06-26 04:47:32 10:140:08:07:46
key image 03: a800d98d99a88660c58c6889358ba5bf177e88975352a1d77c47762774b2085b amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 26a372a9469c5c7fee16268ea4b573b541ec0a481e4e0c029e764b240b6e2c00 00102951 0 0/5 2014-06-26 21:21:34 10:139:15:33:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1130933338, "key_offsets": [ 0 ], "k_image": "a12d966847e8b2dcbe1a669562409d3577830d7a51d0a1fce9e7ad039c4e8996" } }, { "key": { "amount": 900000000000, "key_offsets": [ 31117 ], "k_image": "cf10a526516c6747be02c0a48e8a0321843b6f3a6e2134e2baa1528acc74a143" } }, { "key": { "amount": 50000000000, "key_offsets": [ 98993 ], "k_image": "464a05e5cce795bfae18eec75186cc74ff4b63588cabee3305cb1d9472be3692" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 113037 ], "k_image": "a800d98d99a88660c58c6889358ba5bf177e88975352a1d77c47762774b2085b" } } ], "vout": [ { "amount": 6000000000, "target": { "key": "6b8616330a3ecca7b65ada7fb79d7fba456f9127a0bb1d41a949913f4eb6c65a" } }, { "amount": 40000000000, "target": { "key": "58a92d370733d31faddbc1ec6184371798f78fdf45eecbc9ef76f1b063cb8bbb" } }, { "amount": 200000000000, "target": { "key": "0b63c40fc24086eb304fc5f2db964ed2b1898671ac46d4af3091a5a60f0552e0" } }, { "amount": 200000000000, "target": { "key": "dc0dd0eb94709042af100f9add697c2edf8f00210dc457d12e7c3e91a7176805" } }, { "amount": 200000000000, "target": { "key": "ffcfbe30c52a368b05680f0260943bd1296d0bfff86eec50562722248b9f59c8" } }, { "amount": 300000000000, "target": { "key": "8baeb98b94468b9ce763cf119be0da5e26128cefa975f22955d335ea735ecd84" } }, { "amount": 400000000000, "target": { "key": "46956031529fd677cf863a7cd77bfc2e9212a6f5aad49374561253bba0891086" } }, { "amount": 700000000000, "target": { "key": "3166f55289b65b667cf102a2d4c60a623555fcceac9f58b5a08593034eb7d637" } }, { "amount": 900000000000, "target": { "key": "179f0ffa95670555ce180cfe4af12f761728bfd8a52c4967ead7554e920a3b89" } }, { "amount": 1000000000000, "target": { "key": "ad1d2099e760945654b313e24d2725c6e8f2daa3ee8c9e7b4edcec7df0c6990e" } }, { "amount": 7000000000000, "target": { "key": "396b9a96cab2d85bb91866165b19976365d601d0e952e1558388edaa70215cc8" } } ], "extra": [ 1, 218, 43, 226, 86, 86, 131, 0, 124, 43, 132, 163, 215, 242, 148, 141, 193, 202, 98, 127, 22, 9, 49, 96, 68, 167, 194, 40, 171, 243, 58, 103, 57 ], "signatures": [ "0af9c33d2b6a8d0e3ca289da3cfd42fc3fa28ec627548dea9fa47d93d0748c09eed9a8ded75c2bd234a2009bd8ebc1b98b5bd4d49cdc63c82afc847ad4b83a0c", "9b62b219a296dd06c1282af99e5ad984c06caebeaa7c3a423c27ebda850c89090f6997f19cf8efef0c9f219f137ecf25bd196fb72c41582a72cb9cf6f371ac0e", "388d9fbca967f53836465afb8107aa9d66cffbe870e5b5429708e7470dfca20885ea1d716af765e633a3763195bac6e4f47be2353b9069544aa04ec918c45b01", "0959bf43087926f144f532f4ee0e2d78bcc499ad1b981c451908460c005b420ae7703280b56aff6db11dbd0272e16fe61a3ef90f8ea73e866341ebfa97cd5806"] }


Less details
source code | moneroexplorer