Monero Transaction 21f15fd4f7ed9dd88593f88e948564f83f4850b36c27f54dc9f84f07e9169b5f

Autorefresh is OFF

Tx hash: 21f15fd4f7ed9dd88593f88e948564f83f4850b36c27f54dc9f84f07e9169b5f

Tx prefix hash: 44007630bad2b2e19c5d599316287ecd25c703443cf0412a289e90ad70b7332f
Tx public key: 3282e59d26f08bf90726f82d1025918c12ffa9821f08ab39124ebb975a90e1b4

Transaction 21f15fd4f7ed9dd88593f88e948564f83f4850b36c27f54dc9f84f07e9169b5f was carried out on the Monero network on 2014-06-11 07:38:53. The transaction has 3197984 confirmations. Total output fee is 0.005624429288 XMR.

Timestamp: 1402472333 Timestamp [UTC]: 2014-06-11 07:38:53 Age [y:d:h:m:s]: 10:155:01:30:33
Block: 80241 Fee (per_kB): 0.005624429288 (0.006544790444) Tx size: 0.8594 kB
Tx version: 1 No of confirmations: 3197984 RingCT/type: no
Extra: 013282e59d26f08bf90726f82d1025918c12ffa9821f08ab39124ebb975a90e1b4

8 output(s) for total of 16.365188553470 xmr

stealth address amount amount idx tag
00: da7e942609fdbd12b1f978fd42ded92a8afbb7f40aad06f3c9f33a99d7491753 0.000188553470 1 of 2 -
01: 17837c5dd8d45ade2ca88746beb5eaf8668939b624b15185d7d863851c7c832b 0.006000000000 82754 of 256624 -
02: a80dd18ba0a817a961ad9386db06d3fd96fc3f3dbc422ec9b410f5456f603f30 0.009000000000 72612 of 233398 -
03: bb8e4a089a178d4df41081e9cfc0a1ff2210f733b8f667c3ed0178f20db70a2b 0.020000000000 95869 of 381491 -
04: 8103bbe404a67e09d5db543ce3f2df6b2d2f2fbdf7b251284dab562aabfe82b5 0.030000000000 70196 of 324336 -
05: 933965dab40cbc1b709fc041c0465e9c6fb9fdd6c2b639211aaf398499b5760c 0.300000000000 28831 of 976536 -
06: bfc0da3c1f20a0f290b918298ddfd4c5e63112a33e76d2a3da4cffb6a4067216 6.000000000000 43722 of 207703 -
07: b5c0072013553340052a5dd4559ce2a3f7c9eb7d1ab5fb3fe9812ff9d6736f12 10.000000000000 82906 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-09 01:37:46 till 2014-06-11 07:57:38; resolution: 0.01 days)

  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|

5 inputs(s) for total of 16.370812982758 xmr

key image 00: 440aeb4025e9fed25c91fa56cc7d99066e3641f5e9fa91cf7721151263441461 amount: 0.000812982758
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01774591e9ce75e6b61279eb647009cef078148dc9edc55962d51e2214a50e9c 00076971 0 0/6 2014-06-09 02:37:46 10:157:06:31:40
key image 01: 36f3ac325cc15ae249fe437af52cdcc41d226574413a8239457a1759777feba7 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1c085ad6b03917dfd2083986fc74431c827b9fbeac008b3be559bd1c30af5b0c 00080207 1 8/8 2014-06-11 06:57:38 10:155:02:11:48
key image 02: fa6bc2418d3ecc6a6f1d71ff423c7fb5aa94b6cdd4070c0e20052eae7f27a97f amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a48939a8973277a52039aa90b168fc49ca036bba98cbb7790f21afd66b95d584 00080179 0 0/6 2014-06-11 06:08:50 10:155:03:00:36
key image 03: 797f7cad578ee17126f23d8dea63237f754a1cae42a75733d5af5c6654122e49 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fb871cf2e2b8674aa588f051c55c5bced51f84e793ab817ea9d77fdb2b71866c 00080096 0 0/6 2014-06-11 04:42:16 10:155:04:27:10
key image 04: d43d22cf380649f066ee7b173f4f4fb3661288c3866c167a4c3bdca87ac19b62 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 96a185945e3325eb5a4688335b1ef5eb7207d1b945231b2dca4cd10a198d2931 00080179 0 0/6 2014-06-11 06:08:50 10:155:03:00:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 812982758, "key_offsets": [ 0 ], "k_image": "440aeb4025e9fed25c91fa56cc7d99066e3641f5e9fa91cf7721151263441461" } }, { "key": { "amount": 70000000000, "key_offsets": [ 38584 ], "k_image": "36f3ac325cc15ae249fe437af52cdcc41d226574413a8239457a1759777feba7" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 43655 ], "k_image": "fa6bc2418d3ecc6a6f1d71ff423c7fb5aa94b6cdd4070c0e20052eae7f27a97f" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 82746 ], "k_image": "797f7cad578ee17126f23d8dea63237f754a1cae42a75733d5af5c6654122e49" } }, { "key": { "amount": 300000000000, "key_offsets": [ 28729 ], "k_image": "d43d22cf380649f066ee7b173f4f4fb3661288c3866c167a4c3bdca87ac19b62" } } ], "vout": [ { "amount": 188553470, "target": { "key": "da7e942609fdbd12b1f978fd42ded92a8afbb7f40aad06f3c9f33a99d7491753" } }, { "amount": 6000000000, "target": { "key": "17837c5dd8d45ade2ca88746beb5eaf8668939b624b15185d7d863851c7c832b" } }, { "amount": 9000000000, "target": { "key": "a80dd18ba0a817a961ad9386db06d3fd96fc3f3dbc422ec9b410f5456f603f30" } }, { "amount": 20000000000, "target": { "key": "bb8e4a089a178d4df41081e9cfc0a1ff2210f733b8f667c3ed0178f20db70a2b" } }, { "amount": 30000000000, "target": { "key": "8103bbe404a67e09d5db543ce3f2df6b2d2f2fbdf7b251284dab562aabfe82b5" } }, { "amount": 300000000000, "target": { "key": "933965dab40cbc1b709fc041c0465e9c6fb9fdd6c2b639211aaf398499b5760c" } }, { "amount": 6000000000000, "target": { "key": "bfc0da3c1f20a0f290b918298ddfd4c5e63112a33e76d2a3da4cffb6a4067216" } }, { "amount": 10000000000000, "target": { "key": "b5c0072013553340052a5dd4559ce2a3f7c9eb7d1ab5fb3fe9812ff9d6736f12" } } ], "extra": [ 1, 50, 130, 229, 157, 38, 240, 139, 249, 7, 38, 248, 45, 16, 37, 145, 140, 18, 255, 169, 130, 31, 8, 171, 57, 18, 78, 187, 151, 90, 144, 225, 180 ], "signatures": [ "165bfcc196b2d15dbf5f9cc64ee942f91407d935f1a8348a3e582444b909940a31cdd0c513dde0ee8ec19c8c21cd799375384a99469eb8ba4336c87f2f402008", "1c49897b7f075da700b800a0dbd330f38d3c94cd4e84667b001c16f1047e3e0179a19a2e0113ba16f182291bbba6411a5897cfe287f9ffb05b38214398e27607", "b686a5dfa5198b8bba422184de4cee98b80da816c75862cf75e5867218368c0edf2e387000e3b87d57ccc5de3d387910cb2a8a489bfcb66f3ac2aea4c2148f07", "49326a8f636ba80aaec5c0cef55a383178a0ada78117b7a1146ad1c8f7e16a05f9d01f6ed3b302a8f68820efcbe3a05687e68c2a8e5213e19f126aede6281f0a", "2f7b48fe7b5bda4f3caf149842c7eda1ecf9022c1574d218712054232f59b00bc1e62a9a781e8f0f87b71d12620d6c275b4d29a0798ec147f6bbf3ee6740c90f"] }


Less details
source code | moneroexplorer