Monero Transaction 2047db6c2cd74af92b394b05af2ce6b2c4771c19999c1f1955ec05641293284e

Autorefresh is OFF

Tx hash: 2047db6c2cd74af92b394b05af2ce6b2c4771c19999c1f1955ec05641293284e

Tx prefix hash: cbc902e3ff1f763bf8a8f257017d68f2549218ee92e1bc37b1ba36733317ea5e
Tx public key: 10a8c35265bb517104d334e60d4a78172d0583342e997e086fedc72864f5cbba
Payment id: 5f496a57bd2f464fbbf24b017c6ecc58a380ab8d0785446db0eca64c344aea40

Transaction 2047db6c2cd74af92b394b05af2ce6b2c4771c19999c1f1955ec05641293284e was carried out on the Monero network on 2014-06-30 23:49:03. The transaction has 3169432 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404172143 Timestamp [UTC]: 2014-06-30 23:49:03 Age [y:d:h:m:s]: 10:135:11:41:28
Block: 108867 Fee (per_kB): 0.005000000000 (0.009326047359) Tx size: 0.5361 kB
Tx version: 1 No of confirmations: 3169432 RingCT/type: no
Extra: 0221005f496a57bd2f464fbbf24b017c6ecc58a380ab8d0785446db0eca64c344aea400110a8c35265bb517104d334e60d4a78172d0583342e997e086fedc72864f5cbba

4 output(s) for total of 1.395000000000 xmr

stealth address amount amount idx tag
00: ef0b7677fae44344b822a5d7bb6dc12b9d13c7c86af1565119ae083da3413e7a 0.005000000000 180713 of 308584 -
01: ae44b944672d3a41565b8cd4a64fb82fe1178a08cabe32d344806a4007bc1109 0.090000000000 71382 of 317822 -
02: 7a95940d146a46df28f2976076d8041a0f7d3e9815a6896b3704ca7be6412d9e 0.300000000000 75781 of 976536 -
03: dd03b9e5ddde3534633b2b427c565a197911ef3d87e34b368f2c0b59a61f8ccd 1.000000000000 61109 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-28 07:09:28 till 2014-06-28 21:06:49; resolution: 0.00 days)

  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |_____________________________________________*____________________________________________________________________________________________________________________________|

3 inputs(s) for total of 1.400000000000 xmr

key image 00: 267b61576b7631fb42923c973494e0783dfe595254ced43080c472d0ab0c3e3c amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 389a14e6ee02a1c72f3a837d02f4e03853c0d7d489ba9335b42d4657018a38f1 00105015 1 10/46 2014-06-28 08:09:28 10:138:03:21:03
key image 01: b33eb6110caa7b15ea81dc62693a792507555fabf9996d1dad56fa421b436c29 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7d1a1f4c69a1914863e44b134518852f3672a27a25f9f7036a27b7c454f6da19 00105753 1 38/74 2014-06-28 20:06:49 10:137:15:23:42
key image 02: e8b33df05b15186eeda7a4dfeeb9f7e482c1fd251d91ad26c2f2e1c8c8556678 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 858629f803cf136bbf13af13623aff3cbdf50566ff11177999d7585bb239d7a1 00105180 1 14/58 2014-06-28 10:49:54 10:138:00:40:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 68020 ], "k_image": "267b61576b7631fb42923c973494e0783dfe595254ced43080c472d0ab0c3e3c" } }, { "key": { "amount": 800000000000, "key_offsets": [ 33603 ], "k_image": "b33eb6110caa7b15ea81dc62693a792507555fabf9996d1dad56fa421b436c29" } }, { "key": { "amount": 300000000000, "key_offsets": [ 68526 ], "k_image": "e8b33df05b15186eeda7a4dfeeb9f7e482c1fd251d91ad26c2f2e1c8c8556678" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "ef0b7677fae44344b822a5d7bb6dc12b9d13c7c86af1565119ae083da3413e7a" } }, { "amount": 90000000000, "target": { "key": "ae44b944672d3a41565b8cd4a64fb82fe1178a08cabe32d344806a4007bc1109" } }, { "amount": 300000000000, "target": { "key": "7a95940d146a46df28f2976076d8041a0f7d3e9815a6896b3704ca7be6412d9e" } }, { "amount": 1000000000000, "target": { "key": "dd03b9e5ddde3534633b2b427c565a197911ef3d87e34b368f2c0b59a61f8ccd" } } ], "extra": [ 2, 33, 0, 95, 73, 106, 87, 189, 47, 70, 79, 187, 242, 75, 1, 124, 110, 204, 88, 163, 128, 171, 141, 7, 133, 68, 109, 176, 236, 166, 76, 52, 74, 234, 64, 1, 16, 168, 195, 82, 101, 187, 81, 113, 4, 211, 52, 230, 13, 74, 120, 23, 45, 5, 131, 52, 46, 153, 126, 8, 111, 237, 199, 40, 100, 245, 203, 186 ], "signatures": [ "ef1f38b0368871d8a017176c24a53003bff3ae82b2b0c3489b078d1ae2aa430538657d98499e46bbf5063603cae9af0fd06fa6850421713a627dc32196a6da0e", "536853c38aa11c8e1d2ac084da57e0330ddf2b462f6ecbdf5fc9f5fc7050910340547c5f66045e0dfb556f2b7b87c4c24809c0cb4709a5b5afe9cd1c3b19a50f", "8752c9b19a98ebf5bb7a29bc9a49acd55cb06391ccad3499033766e798f9e203117265d6ab53bb81561b0b276a776d67cbb71cd361490c656f3f13238a8bca03"] }


Less details
source code | moneroexplorer