Monero Transaction 2af433c250e3fa940d46a95842e335779074034a5a1c093b1163ca749e353fbb

Autorefresh is OFF

Tx hash: 2af433c250e3fa940d46a95842e335779074034a5a1c093b1163ca749e353fbb

Tx prefix hash: 76c5a5470f26d5ca72e0bf74d5dc73510dc28b807d62feed0b34009ed06ec217
Tx public key: f4ffa42cfb82ad52cb5c37a6ced67951fbe3f728e96d0bea7f4db491263795c4

Transaction 2af433c250e3fa940d46a95842e335779074034a5a1c093b1163ca749e353fbb was carried out on the Monero network on 2014-06-14 16:27:15. The transaction has 3157294 confirmations. Total output fee is 0.007706565303 XMR.

Timestamp: 1402763235 Timestamp [UTC]: 2014-06-14 16:27:15 Age [y:d:h:m:s]: 10:102:01:23:34
Block: 85191 Fee (per_kB): 0.007706565303 (0.007617300068) Tx size: 1.0117 kB
Tx version: 1 No of confirmations: 3157294 RingCT/type: no
Extra: 01f4ffa42cfb82ad52cb5c37a6ced67951fbe3f728e96d0bea7f4db491263795c4

12 output(s) for total of 16.627293434697 xmr

stealth address amount amount idx tag
00: 545f1eee433a044fc01a41cc23eb0640284553e92909938d05b9af226ace6c5e 0.000241091877 0 of 1 -
01: 4e6de6149cc30dda6a0500eb42f03b016c9fad289bebce39cc51345fdec25dc5 0.000727884295 0 of 1 -
02: be69fc3aaf8269c3648bb77554b9123e4b2028a3dc9674d757ba4eac63cfedba 0.002324458525 0 of 1 -
03: a20113623aa2a86d28f565178cac52e7312d00f162a403f7f84ba8b790aa492e 0.006000000000 115530 of 256624 -
04: 075c88aa65f9fb7518ef2b3035a8da36ece0fd7ce73faff1c1c59a6b42b397d7 0.008000000000 104258 of 245067 -
05: 337adc591b85e9a3f9573643d5b18a44e2fc5ac3db678ab80f37773b3f4da6b5 0.030000000000 97343 of 324336 -
06: af3e2727c404cc55616a5bba57d46f517537e34306122f58f858c9c36b419102 0.040000000000 77839 of 294095 -
07: 9f16fd8a3dafa1d89e10e72b0ec950f524c0c18df66690cc8864eff1963710cb 0.040000000000 77840 of 294095 -
08: a7eeb397ea1597ebc956d3d2d1d1439dc585bf96731288002c6220e1aa9051e0 0.200000000000 48619 of 1272210 -
09: d4c521ac325fd3382e56807019501feefaad7987cc06304ec42b3e2b33b822a1 0.300000000000 38229 of 976536 -
10: 444b25f157179037a0f82d5a18766376c30df4a45f8bf124050d7d77c478ac1c 6.000000000000 48732 of 207703 -
11: bc8d895360fde22921413a2e747a9edda8274e0e061259e1992d3cf88cc1a2eb 10.000000000000 89202 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-13 16:42:11 till 2014-06-14 17:00:19; resolution: 0.01 days)

  • |_______*__________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |______________________________________________________________________________________________________________________________________________________*___________________|

5 inputs(s) for total of 16.635000000000 xmr

key image 00: d32ff73179b9ead2eb85c795e29e0c566445e49e14804b18895e7df239eaee9e amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 945afab8c6c41f9014bdedafcd5813ad63b87f071e9a16ee9dc037dcd7ffa15e 00083775 1 7/15 2014-06-13 17:42:11 10:103:00:08:38
key image 01: b56abbefa23771788430e582441a0d41da10b7efe67f31ce550b138aa0113208 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 41c174483caa6d7a7ff2bca357ebfc1b096979b3a2934cf985f2558da9b6cba2 00085118 0 0/5 2014-06-14 15:17:28 10:102:02:33:21
key image 02: 2a1560e0ca272cf22dc1cad5ec24ba801a9d03fbd37de287eda67d341b7ce20f amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9733ffccc27e235d1ef152ffc91bb919e191d8dad1cfec9a4c2895beded1823d 00085160 1 11/12 2014-06-14 16:00:19 10:102:01:50:30
key image 03: a90a08046ba67676d090c80dbbc16ec9c54fd1a6a68337757998b169c072d229 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6729bc0e290e6f9d70b5b0cc6e1b4e3b5cafbaf1457a8ee58e587474d1cb01a7 00085120 0 0/6 2014-06-14 15:22:22 10:102:02:28:27
key image 04: 3234244d1b48cd0960830148e4806c96989aae1e827b948b88a5cb5b6f0d69e7 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: edf323d9df326205d37bc9a1dd5c23ac139cc67669e7f708d8de94d36af846eb 00085060 0 0/6 2014-06-14 14:11:10 10:102:03:39:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 112475 ], "k_image": "d32ff73179b9ead2eb85c795e29e0c566445e49e14804b18895e7df239eaee9e" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 48665 ], "k_image": "b56abbefa23771788430e582441a0d41da10b7efe67f31ce550b138aa0113208" } }, { "key": { "amount": 600000000000, "key_offsets": [ 19895 ], "k_image": "2a1560e0ca272cf22dc1cad5ec24ba801a9d03fbd37de287eda67d341b7ce20f" } }, { "key": { "amount": 30000000000, "key_offsets": [ 97062 ], "k_image": "a90a08046ba67676d090c80dbbc16ec9c54fd1a6a68337757998b169c072d229" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 89017 ], "k_image": "3234244d1b48cd0960830148e4806c96989aae1e827b948b88a5cb5b6f0d69e7" } } ], "vout": [ { "amount": 241091877, "target": { "key": "545f1eee433a044fc01a41cc23eb0640284553e92909938d05b9af226ace6c5e" } }, { "amount": 727884295, "target": { "key": "4e6de6149cc30dda6a0500eb42f03b016c9fad289bebce39cc51345fdec25dc5" } }, { "amount": 2324458525, "target": { "key": "be69fc3aaf8269c3648bb77554b9123e4b2028a3dc9674d757ba4eac63cfedba" } }, { "amount": 6000000000, "target": { "key": "a20113623aa2a86d28f565178cac52e7312d00f162a403f7f84ba8b790aa492e" } }, { "amount": 8000000000, "target": { "key": "075c88aa65f9fb7518ef2b3035a8da36ece0fd7ce73faff1c1c59a6b42b397d7" } }, { "amount": 30000000000, "target": { "key": "337adc591b85e9a3f9573643d5b18a44e2fc5ac3db678ab80f37773b3f4da6b5" } }, { "amount": 40000000000, "target": { "key": "af3e2727c404cc55616a5bba57d46f517537e34306122f58f858c9c36b419102" } }, { "amount": 40000000000, "target": { "key": "9f16fd8a3dafa1d89e10e72b0ec950f524c0c18df66690cc8864eff1963710cb" } }, { "amount": 200000000000, "target": { "key": "a7eeb397ea1597ebc956d3d2d1d1439dc585bf96731288002c6220e1aa9051e0" } }, { "amount": 300000000000, "target": { "key": "d4c521ac325fd3382e56807019501feefaad7987cc06304ec42b3e2b33b822a1" } }, { "amount": 6000000000000, "target": { "key": "444b25f157179037a0f82d5a18766376c30df4a45f8bf124050d7d77c478ac1c" } }, { "amount": 10000000000000, "target": { "key": "bc8d895360fde22921413a2e747a9edda8274e0e061259e1992d3cf88cc1a2eb" } } ], "extra": [ 1, 244, 255, 164, 44, 251, 130, 173, 82, 203, 92, 55, 166, 206, 214, 121, 81, 251, 227, 247, 40, 233, 109, 11, 234, 127, 77, 180, 145, 38, 55, 149, 196 ], "signatures": [ "1670a44381b1eb94cd599a8674860765316e1e8c9aab7ae164978a09232f13060e7d448ef748d788f3aae5b9a6375e512171fd70bbd9dfe5d59ef501b2cad302", "9d56023cd5691f0c163f53c7fe893cc05269e359382945f84aa7882a7e3d0c004d928c7796033cac46f145dc1fd373eed1e8ffe49e165e2053ce1f914fc50701", "4add3050b4da6b0f2ef352894d6a3fa1098eb47606f801fc40e5779d195e5205fbf8bdf5001ea893055b0f56807dffd6aa06db5f32133b3f4f8372dbb7a2fc02", "97c4cd1b5ff5fa4ad8f81f1d12eaca79a018ee4df7b48cc0346aba9bc5528106bd70578e0a387d76199b70d8310db308ac7a4c1c4da9690ed56aad12e4e23e01", "9ae4a0d1a5f9ce9bf0585959e4885a0c5b2831586b209481f69e4e402d6d590f05dcfe80bde800e79955dbfc8b90ba0e333b788f519a67df1e3438fa3e7d0c0d"] }


Less details
source code | moneroexplorer