Monero Transaction 2af4e763d07adf409c49b85255e8ff612664046083146e1747bb2206f506433e

Autorefresh is OFF

Tx hash: 2af4e763d07adf409c49b85255e8ff612664046083146e1747bb2206f506433e

Tx prefix hash: 96296a484dc0e5a6e38529829769b991550c017cfdd52c11689a0a96cc9fcced
Tx public key: 8a245e037311ac045cf5a86c08993e63ea9e86aa15e1de5c95fee692dd6a6003

Transaction 2af4e763d07adf409c49b85255e8ff612664046083146e1747bb2206f506433e was carried out on the Monero network on 2016-05-03 18:12:53. The transaction has 2264418 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1462299173 Timestamp [UTC]: 2016-05-03 18:12:53 Age [y:d:h:m:s]: 08:228:04:58:51
Block: 1039365 Fee (per_kB): 0.100000000000 (0.137449664430) Tx size: 0.7275 kB
Tx version: 1 No of confirmations: 2264418 RingCT/type: no
Extra: 018a245e037311ac045cf5a86c08993e63ea9e86aa15e1de5c95fee692dd6a6003de2012db6f28103dec3a9d935fec107faf070b769b9056a511eb573cd2aab71132af

5 output(s) for total of 1.908000000000 xmr

stealth address amount amount idx tag
00: a4704408072fb5e4ad9e3d1dc5200a22dfdb845ac79c16d4ceac8cfdb0dbaa9d 0.008000000000 193077 of 245068 -
01: 0326943b3383b91c2fea652ecead6bb0c8a08f363efc7a46759fc7a7891e624b 0.010000000000 437181 of 502466 -
02: aba555893a6e0a3f5983c1e150d0aee8743603cab91af4866f7115abb891e521 0.090000000000 231824 of 317822 -
03: bea413ee82394685c6369f96326c0df2b77d131e7e368384f628cf46405ac2a6 0.800000000000 412020 of 489955 -
04: ecf800bfd642c796a1bdeabd15a6370a097b5000adc9028c70ab60ad15b87df1 1.000000000000 705320 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-06 20:57:10 till 2016-05-03 14:29:19; resolution: 4.10 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |______________________*_________*________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 2.008000000000 xmr

key image 00: 32b9552b5f9aafdb726f739f241ee22ee14ac7894f6b765e9f19246f9f4c340f amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 742f0a896d7baa16f0af55069c3ef1351884553e09d5cd5a698851dda481144f 00073870 0 0/7 2014-06-06 21:57:10 10:195:01:14:34
- 01: b89bc274076747ab041a1da296f3cb1ab9af4adc9d6ec12d4209c008c945ff44 00075765 1 8/292 2014-06-08 05:53:08 10:193:17:18:36
- 02: 205a3835141e119018ef82322f8cc45589355350ba8a07ee2facda92f320ff0c 01039202 3 14/6 2016-05-03 13:29:19 08:228:09:42:25
key image 01: 100abbdd0d5901bbee11966405fe080b77512c86a732ae484959f37f767eb97d amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c2a0acc61f3df33ae455348eb64423e3c6cb2b223a51b3ac467bd92ea6b52e30 00200993 1 24/5 2014-09-03 01:05:53 10:106:22:05:51
- 01: e053b2fb98e5b9c2f6ac583bc60c995b979914b985a8417ebb1c29dc50a118e9 00260003 1 6/100 2014-10-14 06:25:15 10:065:16:46:29
- 02: e450991f134b5d447c569ed12e8bfdad4771f4348e5f77c13e4c48992327422a 01038836 3 7/5 2016-05-03 01:09:24 08:228:22:02:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 51024, 6823, 135227 ], "k_image": "32b9552b5f9aafdb726f739f241ee22ee14ac7894f6b765e9f19246f9f4c340f" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 90399, 25453, 226616 ], "k_image": "100abbdd0d5901bbee11966405fe080b77512c86a732ae484959f37f767eb97d" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "a4704408072fb5e4ad9e3d1dc5200a22dfdb845ac79c16d4ceac8cfdb0dbaa9d" } }, { "amount": 10000000000, "target": { "key": "0326943b3383b91c2fea652ecead6bb0c8a08f363efc7a46759fc7a7891e624b" } }, { "amount": 90000000000, "target": { "key": "aba555893a6e0a3f5983c1e150d0aee8743603cab91af4866f7115abb891e521" } }, { "amount": 800000000000, "target": { "key": "bea413ee82394685c6369f96326c0df2b77d131e7e368384f628cf46405ac2a6" } }, { "amount": 1000000000000, "target": { "key": "ecf800bfd642c796a1bdeabd15a6370a097b5000adc9028c70ab60ad15b87df1" } } ], "extra": [ 1, 138, 36, 94, 3, 115, 17, 172, 4, 92, 245, 168, 108, 8, 153, 62, 99, 234, 158, 134, 170, 21, 225, 222, 92, 149, 254, 230, 146, 221, 106, 96, 3, 222, 32, 18, 219, 111, 40, 16, 61, 236, 58, 157, 147, 95, 236, 16, 127, 175, 7, 11, 118, 155, 144, 86, 165, 17, 235, 87, 60, 210, 170, 183, 17, 50, 175 ], "signatures": [ "776c6812544eca9b85c92693d2af0e18bea7c51575a4ba3a832431a341f6d60154c4a0cd509ed58ac5d1760ab5fd0ff4da3f6e55cf13dea54d5d6dca2ccbbb087ab83656ba9e871d1c22e31005f502329b8d1e4f67db590b4ffca20c7b913107ad3f3e7a54aa561033e2dd668dca8513760ca1ce1ab3fa1b09592127c4c06303e1271ab372b3b7d26973216cbc3e546a47f424be14134767655c2e507420e606d227a500b3646ffc188feafacc253f2bd3bcc71c6712f13b8abc2631acc59b0b", "8ff5b3ec80aec49753f36afc1d0ada688ad6f83d9eaaf98acd4ce880960bb80285c4242a011aa91283a6deba4eab568de388f1915d9a4c81511ddd295a88300ea466eeb6e8b18bb1dc7f16b71909f2f0872e768682bfede0bc96ca0aec63690a343ad70a35155f11a02c925db67b4a59b89f863fd0c6439a46e243e1bcc95a01e1b8a753b684f4a5161af20eee647657353c2191b7b673ce19445afe1d867501cdbea00dddbc867a23054a73b7fbdeeacafe894bd112aa5af711a22f1f32b700"] }


Less details
source code | moneroexplorer