Monero Transaction 2a66bf4f0938ce1382209d80bcadce8760d50363c41470b588141597f6886817

Autorefresh is OFF

Tx hash: 2a66bf4f0938ce1382209d80bcadce8760d50363c41470b588141597f6886817

Tx prefix hash: dd84f86998ae592675b98b52d7d03d33e3860c3c81f95ac1067bd775633a94e1
Tx public key: fcd52c2c8b798c320395ea07ddf0de72d5a7b4b98df45b3c04afed15cd6436d6

Transaction 2a66bf4f0938ce1382209d80bcadce8760d50363c41470b588141597f6886817 was carried out on the Monero network on 2014-05-30 04:42:41. The transaction has 3215741 confirmations. Total output fee is 0.000001167555 XMR.

Timestamp: 1401424961 Timestamp [UTC]: 2014-05-30 04:42:41 Age [y:d:h:m:s]: 10:167:10:15:34
Block: 62657 Fee (per_kB): 0.000001167555 (0.000001208874) Tx size: 0.9658 kB
Tx version: 1 No of confirmations: 3215741 RingCT/type: no
Extra: 01fcd52c2c8b798c320395ea07ddf0de72d5a7b4b98df45b3c04afed15cd6436d6

14 output(s) for total of 10.002007832445 xmr

stealth address amount amount idx tag
00: f3c86ae5c108d01dc040e9925f93091b1cbe26eb90f3ae03ddc0c8354b8c3dde 0.000000832445 0 of 2 -
01: 1c307adc0fc99688f018c8e6b339a3237b6fd6aa9f80bf2412765de7f8404ec1 0.000003000000 11711 of 42340 -
02: e285fc147b6860dca1994cab18b299f77a1176f113f7444ab0144b2668dd4038 0.000004000000 11318 of 41587 -
03: 2e3040419732c1c3632b901a70f3ead56d7dec0b75b07cea675efaf3555c45a0 0.000030000000 26329 of 59483 -
04: 7c0de3504d09e82a0920e0d2f4da17a7e6324cb86410ff002d88f29d1d7b372c 0.000070000000 26559 of 59071 -
05: 4d3f2bc25b6caff251106a56735b9b62eed1c568ea7959ac60a929733238f416 0.000100000000 26648 of 79261 -
06: 3192211d46bc9b5b5fe8ae301cb3291fde9a4fa8a87311e285ed7fb05d5728e9 0.000800000000 25852 of 78160 -
07: b7c38d505581372ad341103a6c9a784330c7b65a69484d846677182ff21ba2e3 0.003000000000 28291 of 90176 -
08: 786c71aa23f17a0224d9007a07c036f538cd907fc6d85e875e71c06d78e66a59 0.008000000000 26395 of 245068 -
09: 35f42c9002c11d1b992bb29971df629fa3853f019f1419871b02bc507653786b 0.010000000000 52689 of 502466 -
10: 61ef82ec57260f4cdfc494c80e9ac7edeff3a4f5af36e2c1efbfde8de0dbabe9 0.080000000000 13796 of 269576 -
11: 70a6e8d4275c1299113ee0cfd0ad736bcadda170cdb8173df160e0d58cfa2ca7 0.100000000000 22026 of 982315 -
12: b7f486cd6beb08bad812ff5925c8dbe0b02d7870e4866ee4df96821bb6265a62 0.800000000000 8886 of 489955 -
13: 318f488b5eb069d3db351c6de7c5dde72bb8288b1f45c9c18a0e179d3cbb8991 9.000000000000 1521 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-28 13:16:43 till 2014-05-30 04:26:48; resolution: 0.01 days)

  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_______________________________________*__________________________________________________________________________________________________________________________________|
  • |_____*____________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________*______________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 10.002009000000 xmr

key image 00: 7d211bbf834e6f0ca4688d60360ceee30ff89204d03de329828c6cec95d4d749 amount: 0.000001000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 36edaeeb184e659b0cce34d5d9f382b76128be5f6baa1f8923bb36bb5b027d9c 00062575 1 10/6 2014-05-30 03:26:48 10:167:11:31:27
key image 01: 86395d509dcd1814883a9cd1b46c39b7f2fd63ef2f45149053fcdbaa650eeb3e amount: 0.000008000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d6e50f6b6f07dd857490d826f8f1a5d54822618ccc66578dff9860472d5b0e56 00060971 1 14/12 2014-05-28 22:17:13 10:168:16:41:02
key image 02: 6dd0c032c9045383cf8babc00ec2be3191600c3a96166066069c66bce48a3afa amount: 0.002000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c4e8f391a93fb003a5e10cb9ec691c9df03e8693b7f3f9431f0712cab7f542c3 00060498 1 12/7 2014-05-28 14:16:43 10:169:00:41:32
key image 03: a6f170fa8b2f8cf1ab19d1b6b65ffdfa061f84272ca208e33d45e0eabe283a1a amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f2242657f89e811a59169bdf44e31d48dfae5a422aa686f58f4d3ee2dc11a77f 00060912 0 0/9 2014-05-28 21:13:36 10:168:17:44:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000, "key_offsets": [ 11528 ], "k_image": "7d211bbf834e6f0ca4688d60360ceee30ff89204d03de329828c6cec95d4d749" } }, { "key": { "amount": 8000000, "key_offsets": [ 12063 ], "k_image": "86395d509dcd1814883a9cd1b46c39b7f2fd63ef2f45149053fcdbaa650eeb3e" } }, { "key": { "amount": 2000000000, "key_offsets": [ 30870 ], "k_image": "6dd0c032c9045383cf8babc00ec2be3191600c3a96166066069c66bce48a3afa" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 60802 ], "k_image": "a6f170fa8b2f8cf1ab19d1b6b65ffdfa061f84272ca208e33d45e0eabe283a1a" } } ], "vout": [ { "amount": 832445, "target": { "key": "f3c86ae5c108d01dc040e9925f93091b1cbe26eb90f3ae03ddc0c8354b8c3dde" } }, { "amount": 3000000, "target": { "key": "1c307adc0fc99688f018c8e6b339a3237b6fd6aa9f80bf2412765de7f8404ec1" } }, { "amount": 4000000, "target": { "key": "e285fc147b6860dca1994cab18b299f77a1176f113f7444ab0144b2668dd4038" } }, { "amount": 30000000, "target": { "key": "2e3040419732c1c3632b901a70f3ead56d7dec0b75b07cea675efaf3555c45a0" } }, { "amount": 70000000, "target": { "key": "7c0de3504d09e82a0920e0d2f4da17a7e6324cb86410ff002d88f29d1d7b372c" } }, { "amount": 100000000, "target": { "key": "4d3f2bc25b6caff251106a56735b9b62eed1c568ea7959ac60a929733238f416" } }, { "amount": 800000000, "target": { "key": "3192211d46bc9b5b5fe8ae301cb3291fde9a4fa8a87311e285ed7fb05d5728e9" } }, { "amount": 3000000000, "target": { "key": "b7c38d505581372ad341103a6c9a784330c7b65a69484d846677182ff21ba2e3" } }, { "amount": 8000000000, "target": { "key": "786c71aa23f17a0224d9007a07c036f538cd907fc6d85e875e71c06d78e66a59" } }, { "amount": 10000000000, "target": { "key": "35f42c9002c11d1b992bb29971df629fa3853f019f1419871b02bc507653786b" } }, { "amount": 80000000000, "target": { "key": "61ef82ec57260f4cdfc494c80e9ac7edeff3a4f5af36e2c1efbfde8de0dbabe9" } }, { "amount": 100000000000, "target": { "key": "70a6e8d4275c1299113ee0cfd0ad736bcadda170cdb8173df160e0d58cfa2ca7" } }, { "amount": 800000000000, "target": { "key": "b7f486cd6beb08bad812ff5925c8dbe0b02d7870e4866ee4df96821bb6265a62" } }, { "amount": 9000000000000, "target": { "key": "318f488b5eb069d3db351c6de7c5dde72bb8288b1f45c9c18a0e179d3cbb8991" } } ], "extra": [ 1, 252, 213, 44, 44, 139, 121, 140, 50, 3, 149, 234, 7, 221, 240, 222, 114, 213, 167, 180, 185, 141, 244, 91, 60, 4, 175, 237, 21, 205, 100, 54, 214 ], "signatures": [ "abfa0fe0a1b6f1f918abb8b14a93122927d0f3c3dd0ae2b4ab90520bb0dfde000c819c4884d90e94a6193c1a68f9e9c1f4916d4111981dc7f267b70a977e660e", "59f52fe05875735ba85dfa522753915d6b5e68c87e3d27606bff653656c1ed08c02594b77119e7212c1dbf69207fe2737b60c39ec4c516c6c60e5d172dc03208", "a6d5dd73d5c7fcabb56ae4251451c4e543a01bbd685b4eeae480962dc5233c06d226f5e6f2ee949aa734eb213723196c772fde86d32f8341e0e30047aed3cb0b", "3ac7f7e0e9404baddcda9bdf8cbee65febbc8f3e3ec8c2db252205d6000fea0f2c0b333c356a3e4b0b33b0383886903298a2cde9072f1de9e764989879d01007"] }


Less details
source code | moneroexplorer