Monero Transaction 260ec69251a89824bb06d3bf333b0d93d8e14e5cb086a88a4bf0b2d67d8dc7ab

Autorefresh is OFF

Tx hash: 260ec69251a89824bb06d3bf333b0d93d8e14e5cb086a88a4bf0b2d67d8dc7ab

Tx prefix hash: 15243b1fd35d4bc1b843f0403597382ea52d94002af08ed50a44f0a066b23469
Tx public key: e19652a074cd321de2e12daea0a9c08c6b40c372d4e21fa8202ba1d64752ce6c
Payment id: d5959039cabbedccd08892b5991554cffb174bb2c94dfad4e405a5be38aabd3c

Transaction 260ec69251a89824bb06d3bf333b0d93d8e14e5cb086a88a4bf0b2d67d8dc7ab was carried out on the Monero network on 2014-07-30 02:12:57. The transaction has 3129341 confirmations. Total output fee is 0.005398730000 XMR.

Timestamp: 1406686377 Timestamp [UTC]: 2014-07-30 02:12:57 Age [y:d:h:m:s]: 10:109:00:23:33
Block: 150806 Fee (per_kB): 0.005398730000 (0.005331050646) Tx size: 1.0127 kB
Tx version: 1 No of confirmations: 3129341 RingCT/type: no
Extra: 022100d5959039cabbedccd08892b5991554cffb174bb2c94dfad4e405a5be38aabd3c01e19652a074cd321de2e12daea0a9c08c6b40c372d4e21fa8202ba1d64752ce6c

7 output(s) for total of 4.014601270000 xmr

stealth address amount amount idx tag
00: c3e60a605b508de9d18ea0254697168937955e7784951f091157579aa9f101cc 0.000601270000 1 of 10 -
01: 226715b2f0e4614f11efe31692d072f492cd764be10c3339eef5182391a86aac 0.006000000000 175993 of 256624 -
02: 77efa626cb252c2d835c6c616e39ad19945993ccd77d96543231ba54c9459d6f 0.008000000000 160019 of 245068 -
03: b8cfe91eb3847017bac663326caf19587b161364fd2ad27a6c56b400345eff57 0.300000000000 134046 of 976536 -
04: 94fcd66850e7fb62f721612d03bfbf95ab75f326bb3075c1e2eabf165c19310d 0.700000000000 87462 of 514467 -
05: 545038343a6f4bd272f7a5bcff42e5e14d63e69b561d4d5c31e0e5a1fc1c6744 1.000000000000 148614 of 874629 -
06: 7f82c836b8431f8d83aafb2d06290454668f569fad5757ecbfd1800854a7c960 2.000000000000 58708 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-13 03:58:39 till 2014-07-30 02:40:32; resolution: 0.28 days)

  • |_______________________________________________________________________________________________________________________________*_________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________*_________________________________________________________________________________________*|

4 inputs(s) for total of 4.020000000000 xmr

key image 00: 00fd987debafb7b311a99b8ee2fb3c90f56cc79bda7d6fdad7c31505d9ab2811 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50c4a3f7ac0b8f963fd3ad19f9754b27ee3cb5b959854f552b7033c8d7043bc9 00133833 1 12/63 2014-07-18 06:52:24 10:120:19:44:06
- 01: 1a63fcaca898ed7e5967066b4eb66f5d686b2fd12eeb46caffe1fc4e2fc501c0 00150778 2 1/5 2014-07-30 01:40:26 10:109:00:56:04
key image 01: 8d5091ee2b0ee96e904b5a5f35148cb1a74d31964031d418313eb775b45b8d23 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cc59573a64ec7f8995d4e34952034c1cb77fbe8ee19cfd62fe1666851c87f686 00082974 1 8/123 2014-06-13 04:58:39 10:155:21:37:51
- 01: 2cbf4fee51a591b19c8e43d440e0dc6d07bd2b14a0b83878f146ef65b770ca7a 00150756 2 3/77 2014-07-30 01:13:57 10:109:01:22:33
key image 02: d58e8c63a399c81c9cb4d3a013db065d104f89dff7f45586929cc79e3b08409d amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 413412bd03928724f1e388d0f1a6cb142f55f6fcc4aad95b209c16f368875d4f 00083216 1 3/138 2014-06-13 08:54:45 10:155:17:41:45
- 01: c6b1cc4b00e5cd37470d12be6c51f102f8f5f0523dc07b9cbc647eb9f9f5f7a7 00150779 2 1/8 2014-07-30 01:40:32 10:109:00:55:58
key image 03: 450956de9a0d49b115cb47f100801f1462ada77667d1afc8e07ab69a9c78aebf amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9399b443fea4c9adbdcda8364f2b97562becb2c3bb549093ecf1baa2e73eb1a8 00114588 1 29/66 2014-07-04 22:57:10 10:134:03:39:20
- 01: 78546a208f56ce3f8f8ea706d01fb0f0ee38d4329dc85a85e73f1aa5f4c83e45 00150778 2 1/5 2014-07-30 01:40:26 10:109:00:56:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 57895, 12142 ], "k_image": "00fd987debafb7b311a99b8ee2fb3c90f56cc79bda7d6fdad7c31505d9ab2811" } }, { "key": { "amount": 70000000000, "key_offsets": [ 45035, 44053 ], "k_image": "8d5091ee2b0ee96e904b5a5f35148cb1a74d31964031d418313eb775b45b8d23" } }, { "key": { "amount": 50000000000, "key_offsets": [ 58514, 52575 ], "k_image": "d58e8c63a399c81c9cb4d3a013db065d104f89dff7f45586929cc79e3b08409d" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 21265, 15656 ], "k_image": "450956de9a0d49b115cb47f100801f1462ada77667d1afc8e07ab69a9c78aebf" } } ], "vout": [ { "amount": 601270000, "target": { "key": "c3e60a605b508de9d18ea0254697168937955e7784951f091157579aa9f101cc" } }, { "amount": 6000000000, "target": { "key": "226715b2f0e4614f11efe31692d072f492cd764be10c3339eef5182391a86aac" } }, { "amount": 8000000000, "target": { "key": "77efa626cb252c2d835c6c616e39ad19945993ccd77d96543231ba54c9459d6f" } }, { "amount": 300000000000, "target": { "key": "b8cfe91eb3847017bac663326caf19587b161364fd2ad27a6c56b400345eff57" } }, { "amount": 700000000000, "target": { "key": "94fcd66850e7fb62f721612d03bfbf95ab75f326bb3075c1e2eabf165c19310d" } }, { "amount": 1000000000000, "target": { "key": "545038343a6f4bd272f7a5bcff42e5e14d63e69b561d4d5c31e0e5a1fc1c6744" } }, { "amount": 2000000000000, "target": { "key": "7f82c836b8431f8d83aafb2d06290454668f569fad5757ecbfd1800854a7c960" } } ], "extra": [ 2, 33, 0, 213, 149, 144, 57, 202, 187, 237, 204, 208, 136, 146, 181, 153, 21, 84, 207, 251, 23, 75, 178, 201, 77, 250, 212, 228, 5, 165, 190, 56, 170, 189, 60, 1, 225, 150, 82, 160, 116, 205, 50, 29, 226, 225, 45, 174, 160, 169, 192, 140, 107, 64, 195, 114, 212, 226, 31, 168, 32, 43, 161, 214, 71, 82, 206, 108 ], "signatures": [ "499f2c2e048e1c1ba16b254194241ae5c57887279f3c81a75f6f7f731f4e7f0da6a4a7433dfe985e9697b27b3eaddb8f74e4f6301d1538067b26e11c8fe05a03b45ad529f0d0f9111208bc8b0502afedc03f0031fba41fd025e97b3565648105b15a9ca83f056581541944d99081807bd3b79fc1deab742e67f12196b46bba08", "bc2016693725c04f3ca01c04e3eaf0ff61d9f1dde7b06f6641ea85eb926a470ce547e672db9fe6eb98894e40a37bce4611a4a92a402134d97668b72e56aec00029fcd560c2856c333286879069ffa846e1fe21cb258a05fc3cd8946655f0130f45910c9548573d04309c1f60b1229197ec45365eed82bbf7cbee185bd29d9806", "059d95abe010d594fc7386a95b84a3b9e5fd6bdc232b60a54bd3e3003ea50d0763b663048ef7a8ff6e57c264da3fe3b906f312dd82a792a670bb16a162a216026fd37f2f3a2b053610a282912052c2941808231af2e16aa3f9610482face750bb35fefa031ad1a0efcf4f91659bdc998a0d0c2aece3e3e8abbe8cd9bd96c1805", "de00d55e1d9d3ed851428f26e0c7c9d6ff653380dc2c41c8b8ca040f867adc01fcff9d4276c6f5680e56b1accb5763421fd9f7a5bc496eb327071352fa10910172fadc0eb49772e4287f9f41c2ab36cb90c4eaa8afbba7b844ae9bcad623770dbb2f7fff51c59a50516052e0e5b2a7c7e553d92340706c7657cd78022976c107"] }


Less details
source code | moneroexplorer