Monero Transaction 2c1fa04e19e35d1d4525d071f13b043e9b8736e7d8e6ab3d6fdb0a75505110e5

Autorefresh is OFF

Tx hash: 2c1fa04e19e35d1d4525d071f13b043e9b8736e7d8e6ab3d6fdb0a75505110e5

Tx prefix hash: c0eaee06d83d3c43fa9fad9037540b31216db7031c4c4517c8a72c9dd9a3eb0d
Tx public key: 2f6cc8ae80187f6b9da17f87cc2924512078785190f371bcda5c07b0bc0eb34e
Payment id: 78f2a83dcc27135ade9ae80372520d3d74fac1842b07ca1c60d5d81717c094a6

Transaction 2c1fa04e19e35d1d4525d071f13b043e9b8736e7d8e6ab3d6fdb0a75505110e5 was carried out on the Monero network on 2014-10-10 05:56:04. The transaction has 3049425 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1412920564 Timestamp [UTC]: 2014-10-10 05:56:04 Age [y:d:h:m:s]: 10:069:13:45:21
Block: 254279 Fee (per_kB): 0.100000000000 (0.154916792738) Tx size: 0.6455 kB
Tx version: 1 No of confirmations: 3049425 RingCT/type: no
Extra: 02210078f2a83dcc27135ade9ae80372520d3d74fac1842b07ca1c60d5d81717c094a6012f6cc8ae80187f6b9da17f87cc2924512078785190f371bcda5c07b0bc0eb34e

4 output(s) for total of 30.700000000000 xmr

stealth address amount amount idx tag
00: ddbd21c3c6dee48dfc51ee0a16e2cbebc8583b23ba813e57063c02510edf42cc 0.700000000000 170347 of 514467 -
01: 775e759e02b310e2393db22acce561846cc7fc5f2984dac23a7b3cf99042980c 2.000000000000 113896 of 434058 -
02: ddd1fc9bf447ce2fd94e0162a649081a7878c841095a8325482a722ebad9fa47 8.000000000000 20844 of 226902 -
03: 7544e8311beda0abe4b9fc5e0d99fafc96518caaa83cad5b655b16ec1d82cc00 20.000000000000 16525 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-08 21:47:49 till 2014-10-09 14:06:30; resolution: 0.00 days)

  • |___________*______________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________*___________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |________________________________*_________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 30.800000000000 xmr

key image 00: 94b04b5b46c98fc8c09452aaa6494b9eac25821bf847cfc13f90adb11ab20ff9 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 30fdd09855a54cdb473837ba64ff7b8d0508306dd1725228fed4702f12abcd84 00252441 1 10/7 2014-10-08 22:47:49 10:070:20:53:36
key image 01: ced5480c90761b5bcf9fb5f767f9f1a548e41195b4044135aaed9d2cec796c08 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cf9e28d3d4689261816a60ac0d7d04edf067dc29b11809c5c96f895739093639 00253012 1 2/6 2014-10-09 08:20:09 10:070:11:21:16
key image 02: 7e704bb30700b804a733c84413449b7ff6a42411fea8906170cd8b7ded3a30b9 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3a7167e7cb1f527e2bc5a1c9e05f7c08adc118d4466ca8db456f5cf17c74656 00253321 1 4/7 2014-10-09 13:06:30 10:070:06:34:55
key image 03: cf7ad2a1e2a017fe6b77f73b990b57995a6b60dc85b5cf1d36659b4289389a9f amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 04eaf80454af4e118cf64f233bc873ee7f204d7481cd0629dd6a9d2a55505d08 00252534 1 1/6 2014-10-09 00:49:30 10:070:18:51:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 295774 ], "k_image": "94b04b5b46c98fc8c09452aaa6494b9eac25821bf847cfc13f90adb11ab20ff9" } }, { "key": { "amount": 800000000000, "key_offsets": [ 174845 ], "k_image": "ced5480c90761b5bcf9fb5f767f9f1a548e41195b4044135aaed9d2cec796c08" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 16450 ], "k_image": "7e704bb30700b804a733c84413449b7ff6a42411fea8906170cd8b7ded3a30b9" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 22940 ], "k_image": "cf7ad2a1e2a017fe6b77f73b990b57995a6b60dc85b5cf1d36659b4289389a9f" } } ], "vout": [ { "amount": 700000000000, "target": { "key": "ddbd21c3c6dee48dfc51ee0a16e2cbebc8583b23ba813e57063c02510edf42cc" } }, { "amount": 2000000000000, "target": { "key": "775e759e02b310e2393db22acce561846cc7fc5f2984dac23a7b3cf99042980c" } }, { "amount": 8000000000000, "target": { "key": "ddd1fc9bf447ce2fd94e0162a649081a7878c841095a8325482a722ebad9fa47" } }, { "amount": 20000000000000, "target": { "key": "7544e8311beda0abe4b9fc5e0d99fafc96518caaa83cad5b655b16ec1d82cc00" } } ], "extra": [ 2, 33, 0, 120, 242, 168, 61, 204, 39, 19, 90, 222, 154, 232, 3, 114, 82, 13, 61, 116, 250, 193, 132, 43, 7, 202, 28, 96, 213, 216, 23, 23, 192, 148, 166, 1, 47, 108, 200, 174, 128, 24, 127, 107, 157, 161, 127, 135, 204, 41, 36, 81, 32, 120, 120, 81, 144, 243, 113, 188, 218, 92, 7, 176, 188, 14, 179, 78 ], "signatures": [ "ca3895320d56eb51a490a834802f0145e414aad765847c0d2ac1413c12863f082e282c15294efcb40b9c2ad2be150e13a909f8e263a139441c67caa65c56ef04", "c76878738db0d9ad09d95bd77d9a83d39b220de39fd441df17331d50960a3c0b5530fae1d2a9af32f4529995f7a1235eb12aa648c4ecb6cdaa98dfb49a0dea0a", "589637d202ae57b076c1d69fa834537202c96f659a2bf9b5706481d4ce60890f286ad7b6479b701ec632a4fa4ede25ee375e95ba2865d5f2bc2d583d53d02505", "ffeddb306ccfb286f1dc2a0a2dfde735126dbd00494e537454083644a3d762059094865c2c56f50a7f44092477998538a4a29a1449e851d26013e8d65f5b580c"] }


Less details
source code | moneroexplorer