Monero Transaction 28c693438eb30975af65484455b312536faddf56a40a6204124c55d0e20061f6

Autorefresh is OFF

Tx hash: 28c693438eb30975af65484455b312536faddf56a40a6204124c55d0e20061f6

Tx prefix hash: 2d0f3d1642d7843cc8defca812e2b12c89b0ee39ce6a7877ad31cd45c26f5908
Tx public key: b1ae4aaf65271487bdbb5a10d82601d946b5da22407e7e0e65e2d03b9a0d319f
Payment id: 59493ce963dc98f029fd5c96e457256c539c8b8735d983e92cc867a8af77df76

Transaction 28c693438eb30975af65484455b312536faddf56a40a6204124c55d0e20061f6 was carried out on the Monero network on 2014-11-03 07:49:42. The transaction has 3014406 confirmations. Total output fee is 0.156651890000 XMR.

Timestamp: 1415000982 Timestamp [UTC]: 2014-11-03 07:49:42 Age [y:d:h:m:s]: 10:044:14:40:42
Block: 288625 Fee (per_kB): 0.156651890000 (0.255026288331) Tx size: 0.6143 kB
Tx version: 1 No of confirmations: 3014406 RingCT/type: no
Extra: 02210059493ce963dc98f029fd5c96e457256c539c8b8735d983e92cc867a8af77df7601b1ae4aaf65271487bdbb5a10d82601d946b5da22407e7e0e65e2d03b9a0d319f

6 output(s) for total of 30.848348110000 xmr

stealth address amount amount idx tag
00: df8c139dad648ebba81682e98a4e987ae5bc12519c1c22d4ea7d12e6d2ca5e66 0.048348110000 0 of 1 -
01: 2e7242771862d74194f6f1666dd851d57cc1f3085592b823b20600da20c44d8a 0.300000000000 310887 of 976536 -
02: f5eadd04c2f4bee30b8606aaa74027757f7e96e0811f298cd4b74da631db9067 0.500000000000 429399 of 1118624 -
03: e4a821c80dc59b8cdd6ba84bd11ea2724c72e065a4277ebe5697ae4c38b16334 1.000000000000 324162 of 874630 -
04: cb620ba4f1c0a877abe14006e103e13b519d2265b615bfc2e8e4e8055203a119 9.000000000000 25033 of 274259 -
05: b0523dc4e43b356fc407a0cbef9864eb16b340ba36fa72e647e1630fa797ef61 20.000000000000 19357 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-10 10:17:44 till 2014-11-03 05:54:30; resolution: 0.50 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

3 inputs(s) for total of 31.005000000000 xmr

key image 00: ce0f960d6d4879f7b6fe1f4fe1e7cbbdf279aa40de745ab773695be8c5af0e0e amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8cfe34916295cdb5c2a0048f98a9ffe73124682d0939a5af7ec4694177d6cc81 00167209 1 20/4 2014-08-10 11:17:44 10:129:11:12:40
key image 01: 379f1ad97fb57ad39d77390e13967ee8c84944fa8f34fc0f8cd6aca7efdcfa1c amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2ddf0ed8c82e4055087942b0b04b2203bd69032a60005f1c99acfab0e13248de 00288416 1 140/3 2014-11-03 04:54:30 10:044:17:35:54
key image 02: 25c55f04b3438533f8651bd0bcb8823abc1d9e6b30b1bfb27ec5b2bb4813523a amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fbf3aec38ad12b1415a3d3aa8414dfd5e2b278ff99d9717aae67c112bf7ed753 00287007 1 39/2 2014-11-02 04:32:04 10:045:17:58:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 207219 ], "k_image": "ce0f960d6d4879f7b6fe1f4fe1e7cbbdf279aa40de745ab773695be8c5af0e0e" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 324006 ], "k_image": "379f1ad97fb57ad39d77390e13967ee8c84944fa8f34fc0f8cd6aca7efdcfa1c" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 9867 ], "k_image": "25c55f04b3438533f8651bd0bcb8823abc1d9e6b30b1bfb27ec5b2bb4813523a" } } ], "vout": [ { "amount": 48348110000, "target": { "key": "df8c139dad648ebba81682e98a4e987ae5bc12519c1c22d4ea7d12e6d2ca5e66" } }, { "amount": 300000000000, "target": { "key": "2e7242771862d74194f6f1666dd851d57cc1f3085592b823b20600da20c44d8a" } }, { "amount": 500000000000, "target": { "key": "f5eadd04c2f4bee30b8606aaa74027757f7e96e0811f298cd4b74da631db9067" } }, { "amount": 1000000000000, "target": { "key": "e4a821c80dc59b8cdd6ba84bd11ea2724c72e065a4277ebe5697ae4c38b16334" } }, { "amount": 9000000000000, "target": { "key": "cb620ba4f1c0a877abe14006e103e13b519d2265b615bfc2e8e4e8055203a119" } }, { "amount": 20000000000000, "target": { "key": "b0523dc4e43b356fc407a0cbef9864eb16b340ba36fa72e647e1630fa797ef61" } } ], "extra": [ 2, 33, 0, 89, 73, 60, 233, 99, 220, 152, 240, 41, 253, 92, 150, 228, 87, 37, 108, 83, 156, 139, 135, 53, 217, 131, 233, 44, 200, 103, 168, 175, 119, 223, 118, 1, 177, 174, 74, 175, 101, 39, 20, 135, 189, 187, 90, 16, 216, 38, 1, 217, 70, 181, 218, 34, 64, 126, 126, 14, 101, 226, 208, 59, 154, 13, 49, 159 ], "signatures": [ "0445bcb957c50bf7fb6905f14cc4f98ce0da79962272bab98ddc4c6315b22c097a4d44cb6328db9e9a19381aa3656ee9230ead701f39b70daa38bf9f139d9908", "22506e8a6b98fd8c8fc3d714bda17b4a3275b86f365b7e5de6b5e1fd7872b703d8886487c692a22ce53bc0c47e2cf717096ce01b8e46df011ad1c188dff93105", "556dbb11dc95c8e07d440f4d06f034f8164c955e9d4d7ec31336a9accc7544049e66d6cdaad5264f898762f6408587f38e7e60d71653424854e605750d57ee09"] }


Less details
source code | moneroexplorer