Monero Transaction 28c2023b7f4f07f30ded4530b3b28e1772548dd3afbea63856552389e6cb5165

Autorefresh is OFF

Tx hash: 28c2023b7f4f07f30ded4530b3b28e1772548dd3afbea63856552389e6cb5165

Tx prefix hash: 36c8baf8a8ac80340c67ff39c5f003d2fef833255c7c8f264e37520f27a7d9d9
Tx public key: ed623b00ddb3f434ddf951fe100df57561457940dee844f5c483f33d17ef707e
Payment id: 5d33a387ed3e0c57076f4951e246139643083ab2937f455b0f7cf9303a2ca49e

Transaction 28c2023b7f4f07f30ded4530b3b28e1772548dd3afbea63856552389e6cb5165 was carried out on the Monero network on 2014-07-16 14:47:39. The transaction has 3147042 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405522059 Timestamp [UTC]: 2014-07-16 14:47:39 Age [y:d:h:m:s]: 10:119:22:36:11
Block: 131309 Fee (per_kB): 0.010000000000 (0.028209366391) Tx size: 0.3545 kB
Tx version: 1 No of confirmations: 3147042 RingCT/type: no
Extra: 0221005d33a387ed3e0c57076f4951e246139643083ab2937f455b0f7cf9303a2ca49e01ed623b00ddb3f434ddf951fe100df57561457940dee844f5c483f33d17ef707e

2 output(s) for total of 0.520000000000 xmr

stealth address amount amount idx tag
00: 4cc4f1db13a8586551bca0669dc14349d6f30213f0152be46da7eb19a8a44c48 0.020000000000 199404 of 381491 -
01: 7f81663d72bdb4e78127a3a4367fc3a9f47b2dfdeabde4d30cb0224add690b84 0.500000000000 129771 of 1118624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-16 12:32:27 till 2014-07-16 15:35:48; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

2 inputs(s) for total of 0.530000000000 xmr

key image 00: 310871f39f9ebcec40e11a17092e6cb8e3ad129bf46cac4af89e3ea5e526cb4f amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3079bc0ee9158ad45a43d8c66d756b2dbf3cd067ccd7cafc8bf3519bb65d455c 00131242 1 6/3 2014-07-16 13:32:27 10:119:23:51:23
key image 01: 3f59cd61f1a4f0e50eb5554bba719257db78b0eeed8d6445a93a847aba7bbda0 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8d09a07a0bf93fe5c9212040f531aeacf656696dfd8e2c9103fac757ae20c70f 00131298 1 24/64 2014-07-16 14:35:48 10:119:22:48:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 148372 ], "k_image": "310871f39f9ebcec40e11a17092e6cb8e3ad129bf46cac4af89e3ea5e526cb4f" } }, { "key": { "amount": 500000000000, "key_offsets": [ 129747 ], "k_image": "3f59cd61f1a4f0e50eb5554bba719257db78b0eeed8d6445a93a847aba7bbda0" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "4cc4f1db13a8586551bca0669dc14349d6f30213f0152be46da7eb19a8a44c48" } }, { "amount": 500000000000, "target": { "key": "7f81663d72bdb4e78127a3a4367fc3a9f47b2dfdeabde4d30cb0224add690b84" } } ], "extra": [ 2, 33, 0, 93, 51, 163, 135, 237, 62, 12, 87, 7, 111, 73, 81, 226, 70, 19, 150, 67, 8, 58, 178, 147, 127, 69, 91, 15, 124, 249, 48, 58, 44, 164, 158, 1, 237, 98, 59, 0, 221, 179, 244, 52, 221, 249, 81, 254, 16, 13, 245, 117, 97, 69, 121, 64, 222, 232, 68, 245, 196, 131, 243, 61, 23, 239, 112, 126 ], "signatures": [ "cee7e57406948d7feba685ee59912a2187bef671c74a030818ec402f0dcfcf0a1dc67e8cccc6af1ce1ebf51eca54a1b62e2d2f315dd38fc9bf8e992b16719f0c", "dd479c2b68ec071f99d915154819f2cf87de927904ff7d9e1b882e5bbbf46709fea7115e053dde2ed4e6676bd53f65735e736571d8f5a3b60768b8296c354100"] }


Less details
source code | moneroexplorer