Monero Transaction 2138fac278965db5bd1e7ab7a93478f33068c5cd8e8d868daa555def8d893254

Autorefresh is OFF

Tx hash: 2138fac278965db5bd1e7ab7a93478f33068c5cd8e8d868daa555def8d893254

Tx prefix hash: 37d7b5091e8fb37d2bee47dde6e3049e04cbc04415c8f642b932c714caaf051f
Tx public key: 767d4618611a59266a5bea00131fe400c5aba9df9af2a020f77aaf69d78d8be5
Payment id: 064a679c3ec9c686fc0664a120568133f5b2aced6e4f9b475a4a68b7568e550a

Transaction 2138fac278965db5bd1e7ab7a93478f33068c5cd8e8d868daa555def8d893254 was carried out on the Monero network on 2016-03-21 11:21:08. The transaction has 2294076 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1458559268 Timestamp [UTC]: 2016-03-21 11:21:08 Age [y:d:h:m:s]: 08:267:07:33:45
Block: 1006725 Fee (per_kB): 0.100000000000 (0.103121852971) Tx size: 0.9697 kB
Tx version: 1 No of confirmations: 2294076 RingCT/type: no
Extra: 01767d4618611a59266a5bea00131fe400c5aba9df9af2a020f77aaf69d78d8be5022100064a679c3ec9c686fc0664a120568133f5b2aced6e4f9b475a4a68b7568e550a

10 output(s) for total of 42.000252714408 xmr

stealth address amount amount idx tag
00: 432c640e62322ff9d387f4fb8360912604a5f4430490ca312b3096d14ca90f29 0.002334512530 0 of 1 -
01: 57709b127ef074beda773952527b637e9b09fc602948b2b84477002e36489002 0.020000000000 313365 of 381492 -
02: 57b0c93ed5911ade7f816e66f3fd97b9ee8ba6be3125c3eb03dace9dff726c05 0.200000000000 1097918 of 1272210 -
03: 13ec2c522e471b279eca8d5c51afb1b42381a71513203d646c26b4d02bb5fd51 3.000000000000 232827 of 300495 -
04: c5fb84f314373a111c5b0952274362d4f919f383bc48f0dfd2b25022ecba4dda 0.000918201878 0 of 1 -
05: 70368012c8bf2a40c3f8ff4daa8d27a2a7de5b7f95f897cb5281011f78c1ad51 0.007000000000 196579 of 247340 -
06: 11d3df737e6fdc3c90f6a156b9682fdc87f408474e99c3566624fd11dd1ed45c 0.070000000000 194132 of 263947 -
07: 30801fc442667fb72029be86339193740acadaad8bffcbdb7111b665aaca3763 0.700000000000 426112 of 514467 -
08: e5e6e1e6ead0efc094ce9a00bf18f38f25324846e227dd231d755d6344b08bdd 8.000000000000 188300 of 226902 -
09: a32d0f109aa13b426ff77ba61dce3c16ecdfdd7bb445f068843ed9101b1d3ac7 30.000000000000 30422 of 49201 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2016-03-06 10:51:49 till 2016-03-21 05:43:02; resolution: 0.09 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

5 inputs(s) for total of 42.100252714408 xmr

key image 00: 5d5cbfc9c5e8776d2c36d3b25e054ee49f3bb1556ab4bdf0e9fbddae55de58ab amount: 0.000252714408
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f21917f6eb7d700d9c505baee6d4b35add86ad2372140bf4e49f8d7f790afe1c 00985501 1 2/4 2016-03-06 11:51:49 08:282:07:03:04
key image 01: ce506f16397a6aed441c17c2b116b8002a3d9011d2b6f11d5d0ac53ac2ddb923 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ce52aa890912e10de8ad2e54d780320ac5737476537e1587caba29c31b8bec1b 01005579 1 11/10 2016-03-20 13:53:59 08:268:05:00:54
key image 02: e0a0526d630710a89dedd53247c917605cfaec4799a2870f0edfe2b1f57f3d97 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 076e388d7aa826ecd01d5f5f56259d3772d4ac7e5482708778a861f5109bbde1 01006288 1 4/11 2016-03-21 04:43:02 08:267:14:11:51
key image 03: 7494b2f79046d3f05fc7765809827854a58d5c4cfc26a1648a5353765f77dbcf amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7cb50650f2824af04329fd7609da8db54094e98a5efed56e2a65580747c7ba05 01005639 1 4/11 2016-03-20 14:51:38 08:268:04:03:15
key image 04: 2618e5e24013bf487ca3bb462eff88aeb9d9936784620a1599eb3345b26dd04b amount: 40.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0989a8b06e84a18c6109f137ff51f503790b6219e946e99bc2b3a8908668a031 01006091 1 2/8 2016-03-20 23:39:04 08:267:19:15:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 252714408, "key_offsets": [ 1 ], "k_image": "5d5cbfc9c5e8776d2c36d3b25e054ee49f3bb1556ab4bdf0e9fbddae55de58ab" } }, { "key": { "amount": 800000000000, "key_offsets": [ 401410 ], "k_image": "ce506f16397a6aed441c17c2b116b8002a3d9011d2b6f11d5d0ac53ac2ddb923" } }, { "key": { "amount": 900000000000, "key_offsets": [ 355431 ], "k_image": "e0a0526d630710a89dedd53247c917605cfaec4799a2870f0edfe2b1f57f3d97" } }, { "key": { "amount": 400000000000, "key_offsets": [ 565346 ], "k_image": "7494b2f79046d3f05fc7765809827854a58d5c4cfc26a1648a5353765f77dbcf" } }, { "key": { "amount": 40000000000000, "key_offsets": [ 23291 ], "k_image": "2618e5e24013bf487ca3bb462eff88aeb9d9936784620a1599eb3345b26dd04b" } } ], "vout": [ { "amount": 2334512530, "target": { "key": "432c640e62322ff9d387f4fb8360912604a5f4430490ca312b3096d14ca90f29" } }, { "amount": 20000000000, "target": { "key": "57709b127ef074beda773952527b637e9b09fc602948b2b84477002e36489002" } }, { "amount": 200000000000, "target": { "key": "57b0c93ed5911ade7f816e66f3fd97b9ee8ba6be3125c3eb03dace9dff726c05" } }, { "amount": 3000000000000, "target": { "key": "13ec2c522e471b279eca8d5c51afb1b42381a71513203d646c26b4d02bb5fd51" } }, { "amount": 918201878, "target": { "key": "c5fb84f314373a111c5b0952274362d4f919f383bc48f0dfd2b25022ecba4dda" } }, { "amount": 7000000000, "target": { "key": "70368012c8bf2a40c3f8ff4daa8d27a2a7de5b7f95f897cb5281011f78c1ad51" } }, { "amount": 70000000000, "target": { "key": "11d3df737e6fdc3c90f6a156b9682fdc87f408474e99c3566624fd11dd1ed45c" } }, { "amount": 700000000000, "target": { "key": "30801fc442667fb72029be86339193740acadaad8bffcbdb7111b665aaca3763" } }, { "amount": 8000000000000, "target": { "key": "e5e6e1e6ead0efc094ce9a00bf18f38f25324846e227dd231d755d6344b08bdd" } }, { "amount": 30000000000000, "target": { "key": "a32d0f109aa13b426ff77ba61dce3c16ecdfdd7bb445f068843ed9101b1d3ac7" } } ], "extra": [ 1, 118, 125, 70, 24, 97, 26, 89, 38, 106, 91, 234, 0, 19, 31, 228, 0, 197, 171, 169, 223, 154, 242, 160, 32, 247, 122, 175, 105, 215, 141, 139, 229, 2, 33, 0, 6, 74, 103, 156, 62, 201, 198, 134, 252, 6, 100, 161, 32, 86, 129, 51, 245, 178, 172, 237, 110, 79, 155, 71, 90, 74, 104, 183, 86, 142, 85, 10 ], "signatures": [ "222e63911db5c92081193449637c7e2a7bd0531264cdd19f45060b72bad22d011ce041c02edb8cc0d5f211dae835dceecccda92b903fc2b92072c44071dc4e0c", "b4f9ca98e609a4d8e2d8ea93d7f00632f6b4a2737abcfe2f4bcf45aa4b6fe806e4e0cf67cedeca0b581e113f18c805814b30ef57f8a7f24ef5de6e7faf950d06", "0f27ee32b5788fb152af9b264ee7348aed0f00dbfc5406eb2c9540b0838a9f05d35703711a65b7ebe87caabb127514c7df57eed134d44cb88bb83a640e7d1e07", "a351b7324a88645120784c3ac536e7b0ae2591959c4fbef76233dafa76db270800cd99035eab0975b9e729051b4f354b25d25f14967b6564ad5c37888ab0300c", "6b3224984e7db47fbea75548d0cb1a06f0686ace3dcd152e530c411afcd03503f4518f835630893a1e46bdc5296118fc2b29f8e263e797ca494ef8eb9083b70b"] }


Less details
source code | moneroexplorer