Monero Transaction 2d9f0b67b5b2d4d999acddb92da4623b70cc5f382c7256f4c46b27a60b45cf44

Autorefresh is OFF

Tx hash: 2d9f0b67b5b2d4d999acddb92da4623b70cc5f382c7256f4c46b27a60b45cf44

Tx prefix hash: 11b948da3fb164f77e7bd9e8d7777bd341bd40014a3b0ffb69d2c33ff87616ca
Tx public key: 6a27f1f88c71b9e48832cf619b37b44841480a87cc4c0297e55beb1b32e06c22
Payment id: 3279782852534fb585d2c2ae59463698950777fcceec4c85b732c58890f95480

Transaction 2d9f0b67b5b2d4d999acddb92da4623b70cc5f382c7256f4c46b27a60b45cf44 was carried out on the Monero network on 2014-06-23 16:39:02. The transaction has 3181870 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1403541542 Timestamp [UTC]: 2014-06-23 16:39:02 Age [y:d:h:m:s]: 10:145:12:22:00
Block: 98344 Fee (per_kB): 0.010000000000 (0.031702786378) Tx size: 0.3154 kB
Tx version: 1 No of confirmations: 3181870 RingCT/type: no
Extra: 0221003279782852534fb585d2c2ae59463698950777fcceec4c85b732c58890f95480016a27f1f88c71b9e48832cf619b37b44841480a87cc4c0297e55beb1b32e06c22

1 output(s) for total of 0.001000000000 xmr

stealth address amount amount idx tag
00: 2d57a011360035dce60fb97509742e4797a1272c060a36ae49366419ee57e31c 0.001000000000 43624 of 100400 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-19 03:51:48 till 2014-06-21 22:32:37; resolution: 0.02 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

2 inputs(s) for total of 0.011000000000 xmr

key image 00: e962e56abf3982e6470e77c8515f98ee51b41fb020ad870add9017a06f6b92c2 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ad6067735370236622a33a9826ecff4b792f86131cb880cb89389c248a62c7d4 00091699 1 3/150 2014-06-19 04:51:48 10:150:00:09:14
key image 01: fa0f5294810a3a923c065c5943d3404b7151cfbf016ce39921193def7c7522b5 amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3acbcf022ea07baf75f2325f20869f56a58385fd2e563bd107944754ea47e16c 00095739 1 12/104 2014-06-21 21:32:37 10:147:07:28:25
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 155861 ], "k_image": "e962e56abf3982e6470e77c8515f98ee51b41fb020ad870add9017a06f6b92c2" } }, { "key": { "amount": 6000000000, "key_offsets": [ 157733 ], "k_image": "fa0f5294810a3a923c065c5943d3404b7151cfbf016ce39921193def7c7522b5" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "2d57a011360035dce60fb97509742e4797a1272c060a36ae49366419ee57e31c" } } ], "extra": [ 2, 33, 0, 50, 121, 120, 40, 82, 83, 79, 181, 133, 210, 194, 174, 89, 70, 54, 152, 149, 7, 119, 252, 206, 236, 76, 133, 183, 50, 197, 136, 144, 249, 84, 128, 1, 106, 39, 241, 248, 140, 113, 185, 228, 136, 50, 207, 97, 155, 55, 180, 72, 65, 72, 10, 135, 204, 76, 2, 151, 229, 91, 235, 27, 50, 224, 108, 34 ], "signatures": [ "cba028e34b540457bb13c9e1292a9d4709000aa304fca2f5d6e422a075984100b0e877835b79a22947c8a44d977d04d9e49952816cb6548c963ea46423bf400b", "b0ca24243cb6eca7a120417425f40022352fe325f7a0e07be02e05ccf8ef2f01732015f43ac8f9b5ca693440f6b5d571225d8dba9649453741f1c23707d9c808"] }


Less details
source code | moneroexplorer