Monero Transaction 257dd0048741551ff82135a53014db36b49150bb41fde382b50979e6f2192442

Autorefresh is OFF

Tx hash: 257dd0048741551ff82135a53014db36b49150bb41fde382b50979e6f2192442

Tx prefix hash: 24bd8937bd89c5ba8a5ee20f1eb1886cf530062b046741fd54653184aea1f4af
Tx public key: 64f32f05a74acd9dd33e29f195a206a91f8eec405f3928d7b9a871c2a607be07
Payment id: 0823053f10517df0f7fa81ad29bbf85ed0eab17c7055d74cda2602dc1d7af536

Transaction 257dd0048741551ff82135a53014db36b49150bb41fde382b50979e6f2192442 was carried out on the Monero network on 2014-07-24 02:25:16. The transaction has 3158372 confirmations. Total output fee is 0.005519988543 XMR.

Timestamp: 1406168716 Timestamp [UTC]: 2014-07-24 02:25:16 Age [y:d:h:m:s]: 10:143:09:41:14
Block: 142196 Fee (per_kB): 0.005519988543 (0.008040495403) Tx size: 0.6865 kB
Tx version: 1 No of confirmations: 3158372 RingCT/type: no
Extra: 0221000823053f10517df0f7fa81ad29bbf85ed0eab17c7055d74cda2602dc1d7af5360164f32f05a74acd9dd33e29f195a206a91f8eec405f3928d7b9a871c2a607be07

8 output(s) for total of 9.073480011457 xmr

stealth address amount amount idx tag
00: 541af23eaa86d564e2372b8bdeeb8c1f2760ae1f639f10f7cfaa5404e2b2152f 0.000480011457 0 of 1 -
01: f2d7905c18a89cddacba7f8a687d01a6fe308f9c878c8535c2e89e0308754639 0.005000000000 193894 of 308585 -
02: ed8de0d2fb0289207a985fd60f01e85662078347158acbca040a82c30424da24 0.008000000000 157498 of 245068 -
03: f3fdfdfbde255e4194f2d48520c59caef9012ecde581f0827bdda862b71b19cf 0.060000000000 95117 of 264760 -
04: 3ddc88ee00ccd8a1917cb97ed133d4efd2e60136ab1631598a4fc6be3c68449c 0.100000000000 313686 of 982315 -
05: 23319889f0c3c137e09846eab39f35ead491f04c9c7c534720c8af0a7cbb5429 0.900000000000 63763 of 454894 -
06: 8451f785755a31cfeda89d5da4da3bff6de5742560363453413eb2890f966247 1.000000000000 129497 of 874629 -
07: d9a67c0caa17f968755051d65ea461fbdebd2f0718366a7804dfde2279742573 7.000000000000 46254 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-22 16:18:53 till 2014-07-23 13:45:39; resolution: 0.01 days)

  • |___________________________________________*______________________________________________________________________________________________________________________________|
  • |________*_________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|

3 inputs(s) for total of 9.079000000000 xmr

key image 00: 39bac218a9dc0c6e1fded8a3c09e05c393515f467b06debdbdc78fbd1ad9ce90 amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 56e0c900ff8ca6f6a5e380b8bf2f5e4cc95e2634b8babf0443a034c9f3e8477f 00140478 1 8/5 2014-07-22 21:44:11 10:144:14:22:19
key image 01: b6e9afa56eb932f447105625bc9692b638d900346c0a9afdcded5ecba3741120 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d776b61b09f817bd29fb63d19b1b8d8ae283cfd41c6c89b6e1850e8eeaef3d94 00140248 1 3/7 2014-07-22 17:18:53 10:144:18:47:37
key image 02: 5878f1069879c88009a3af9f8f165c25763b4abbdc6a7c37d355edece7c6f595 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 86018d6787a61ca1bea9f1acf3002e09f11a7dd566a57c8f90d1ee8fff220c08 00141367 1 3/5 2014-07-23 12:45:39 10:143:23:20:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000, "key_offsets": [ 151499 ], "k_image": "39bac218a9dc0c6e1fded8a3c09e05c393515f467b06debdbdc78fbd1ad9ce90" } }, { "key": { "amount": 70000000000, "key_offsets": [ 85882 ], "k_image": "b6e9afa56eb932f447105625bc9692b638d900346c0a9afdcded5ecba3741120" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 12344 ], "k_image": "5878f1069879c88009a3af9f8f165c25763b4abbdc6a7c37d355edece7c6f595" } } ], "vout": [ { "amount": 480011457, "target": { "key": "541af23eaa86d564e2372b8bdeeb8c1f2760ae1f639f10f7cfaa5404e2b2152f" } }, { "amount": 5000000000, "target": { "key": "f2d7905c18a89cddacba7f8a687d01a6fe308f9c878c8535c2e89e0308754639" } }, { "amount": 8000000000, "target": { "key": "ed8de0d2fb0289207a985fd60f01e85662078347158acbca040a82c30424da24" } }, { "amount": 60000000000, "target": { "key": "f3fdfdfbde255e4194f2d48520c59caef9012ecde581f0827bdda862b71b19cf" } }, { "amount": 100000000000, "target": { "key": "3ddc88ee00ccd8a1917cb97ed133d4efd2e60136ab1631598a4fc6be3c68449c" } }, { "amount": 900000000000, "target": { "key": "23319889f0c3c137e09846eab39f35ead491f04c9c7c534720c8af0a7cbb5429" } }, { "amount": 1000000000000, "target": { "key": "8451f785755a31cfeda89d5da4da3bff6de5742560363453413eb2890f966247" } }, { "amount": 7000000000000, "target": { "key": "d9a67c0caa17f968755051d65ea461fbdebd2f0718366a7804dfde2279742573" } } ], "extra": [ 2, 33, 0, 8, 35, 5, 63, 16, 81, 125, 240, 247, 250, 129, 173, 41, 187, 248, 94, 208, 234, 177, 124, 112, 85, 215, 76, 218, 38, 2, 220, 29, 122, 245, 54, 1, 100, 243, 47, 5, 167, 74, 205, 157, 211, 62, 41, 241, 149, 162, 6, 169, 31, 142, 236, 64, 95, 57, 40, 215, 185, 168, 113, 194, 166, 7, 190, 7 ], "signatures": [ "44592f28f4b738238d4f0b19c5da0fc8e9c6e20487d7d6138af303ca0d9f76079336ff50d19d778a6b71808caa13f7ed40e45c4d2924e282d27247e40ed68209", "494945c4a16ef7a68e839c998b1417d08060e13911552c71e2581d07a1f3fc0266b56fc86c0a0dab7ccf5662ccc71bdd8231343bcaf2c3fe0d66c8a43777040d", "07bda0ced6aaecfc0d71481286f62fad40e6ac3c7a00b3adac531f5bb68e1409df8420ac20154fae315969eeb87f3029d4ecc94cff9795c6a5b31c5d9438b70d"] }


Less details
source code | moneroexplorer