Monero Transaction 2dcf1d2f56c2ed08625e203cc5aa7226bc75254211bb07b0d3420fd1e540cdc6

Autorefresh is OFF

Tx hash: 2dcf1d2f56c2ed08625e203cc5aa7226bc75254211bb07b0d3420fd1e540cdc6

Tx prefix hash: 95c190efee7accdc87ab3afe61876f8f9efb493bdcfe2de30948088e0b5ca226
Tx public key: 23a2410b6a014260fb2200c218cc8a3c46b63733c39cd485bd31ab9cd26a53e1

Transaction 2dcf1d2f56c2ed08625e203cc5aa7226bc75254211bb07b0d3420fd1e540cdc6 was carried out on the Monero network on 2014-07-13 07:48:02. The transaction has 3151884 confirmations. Total output fee is 0.005679637353 XMR.

Timestamp: 1405237682 Timestamp [UTC]: 2014-07-13 07:48:02 Age [y:d:h:m:s]: 10:123:08:03:02
Block: 126540 Fee (per_kB): 0.005679637353 (0.005880635642) Tx size: 0.9658 kB
Tx version: 1 No of confirmations: 3151884 RingCT/type: no
Extra: 0123a2410b6a014260fb2200c218cc8a3c46b63733c39cd485bd31ab9cd26a53e1

8 output(s) for total of 16.317000000000 xmr

stealth address amount amount idx tag
00: 4f6d6e7036731e7509378f43655f7395e7162afb35aa1d1397f7c7a037cfe67d 0.007000000000 161306 of 247340 -
01: 31f99a7032a0e8b88a0da1a195e176f72a79197a6ca4e801f9a6ca3bac92f4c2 0.010000000000 312511 of 502466 -
02: f0106facd26e74db4d4a09d9ce56340cc9bb6c984fd7f668567f9f5cd161bb59 0.700000000000 63931 of 514466 -
03: c8e06cff331192c28a82a77accca5c5c7d542ed95b4cfbc66dd3ffc68e1d70c2 0.700000000000 63932 of 514466 -
04: 1a48302eed106a49189bfa37be9ba82975ef1d7d4d104d8bd011a4a609db2cb4 0.900000000000 52847 of 454894 -
05: 5e2af5753972ac9f894bb3f28fa3c93f5cde89042a29daaf31aaa0fadbd43bf7 1.000000000000 98250 of 874629 -
06: 87ebc364a42e2f97c5c956d2f3ff5277b264a1cc3094e6578139e0c5d9deace0 3.000000000000 26474 of 300495 -
07: 27fb06bcaf813cba95b095c5b8fae4a35c585634e8b376125b8f70fbf3ed52c9 10.000000000000 142210 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-02 23:23:20 till 2014-07-13 07:12:54; resolution: 0.06 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________________________________________________________________*______________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|

6 inputs(s) for total of 16.322679637353 xmr

key image 00: b0a6880523cdf755cd625c8dca6b98c72590fa062440a82b41497c63c0dde22d amount: 0.002679637353
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b7906e68bc419dc5d1c0df25ae24e171db4fd8257474a409e3343248376b7ba4 00111770 0 0/5 2014-07-03 00:23:20 10:133:15:27:44
key image 01: fb84f94b52070ee9872ce5b25a15a8709165e1c63a5270bf6139b4a529a217e5 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e929f297da232cf7a4bd409d99205582e97207fc7a093b6729facc548cef4ee3 00126031 0 0/5 2014-07-12 22:23:33 10:123:17:27:31
key image 02: 521ad2396486076255e82022a231686b3e5d75a2cd74160660be9dcd214d464c amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0d5a3e8e8f0f8fe8f32bce5d270de30ff77722a150179467bed21de8919999a0 00126473 0 0/6 2014-07-13 06:12:54 10:123:09:38:10
key image 03: 78e4b52c29114a8484613241f5d4969848d1ef6abd1bc5bb144e5ab619e96044 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 67f279ee77bb210a1bc3381a96bd9b998366f3bf82c892ef786a966a0b827fb1 00126473 0 0/6 2014-07-13 06:12:54 10:123:09:38:10
key image 04: 8c4d0c54d410abb6498913b03e30974ecdc17d0543a1d8e408dd76b9bb816b66 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6169197647d1ed0b90a3a36e57544f14fca5c2fa29bd7ecdf22caa3e179e5ec7 00125279 1 8/15 2014-07-12 10:02:26 10:124:05:48:38
key image 05: 09d2f8ccde5cb980aaecc7cf91e7b585418438521f7fbc4d1f17685f1ae39edd amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cc80b1f759d897653605f000b2d613d04188a3275684cb85dacb0e4ef8b4c839 00125981 0 0/5 2014-07-12 21:43:24 10:123:18:07:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2679637353, "key_offsets": [ 0 ], "k_image": "b0a6880523cdf755cd625c8dca6b98c72590fa062440a82b41497c63c0dde22d" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 141586 ], "k_image": "fb84f94b52070ee9872ce5b25a15a8709165e1c63a5270bf6139b4a529a217e5" } }, { "key": { "amount": 600000000000, "key_offsets": [ 79889 ], "k_image": "521ad2396486076255e82022a231686b3e5d75a2cd74160660be9dcd214d464c" } }, { "key": { "amount": 20000000000, "key_offsets": [ 198297 ], "k_image": "78e4b52c29114a8484613241f5d4969848d1ef6abd1bc5bb144e5ab619e96044" } }, { "key": { "amount": 700000000000, "key_offsets": [ 62661 ], "k_image": "8c4d0c54d410abb6498913b03e30974ecdc17d0543a1d8e408dd76b9bb816b66" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 49110 ], "k_image": "09d2f8ccde5cb980aaecc7cf91e7b585418438521f7fbc4d1f17685f1ae39edd" } } ], "vout": [ { "amount": 7000000000, "target": { "key": "4f6d6e7036731e7509378f43655f7395e7162afb35aa1d1397f7c7a037cfe67d" } }, { "amount": 10000000000, "target": { "key": "31f99a7032a0e8b88a0da1a195e176f72a79197a6ca4e801f9a6ca3bac92f4c2" } }, { "amount": 700000000000, "target": { "key": "f0106facd26e74db4d4a09d9ce56340cc9bb6c984fd7f668567f9f5cd161bb59" } }, { "amount": 700000000000, "target": { "key": "c8e06cff331192c28a82a77accca5c5c7d542ed95b4cfbc66dd3ffc68e1d70c2" } }, { "amount": 900000000000, "target": { "key": "1a48302eed106a49189bfa37be9ba82975ef1d7d4d104d8bd011a4a609db2cb4" } }, { "amount": 1000000000000, "target": { "key": "5e2af5753972ac9f894bb3f28fa3c93f5cde89042a29daaf31aaa0fadbd43bf7" } }, { "amount": 3000000000000, "target": { "key": "87ebc364a42e2f97c5c956d2f3ff5277b264a1cc3094e6578139e0c5d9deace0" } }, { "amount": 10000000000000, "target": { "key": "27fb06bcaf813cba95b095c5b8fae4a35c585634e8b376125b8f70fbf3ed52c9" } } ], "extra": [ 1, 35, 162, 65, 11, 106, 1, 66, 96, 251, 34, 0, 194, 24, 204, 138, 60, 70, 182, 55, 51, 195, 156, 212, 133, 189, 49, 171, 156, 210, 106, 83, 225 ], "signatures": [ "9eaa0eb618874def1996bb6407d5bdd5cb6e7dbc272b5726c22f2582f886f2041e8bf8e7e2d24b7c97c8531eff05c30badf596019dad4519cb46dd2f589eb500", "8cf075746c0d16030ffdf42ee98e540c1c3bb25e897848e93c401651e9739506013a3fd00a05be66c103d9106a49a7ca525284cd75f419121a2193fd9bacdb0b", "4a887462d77948885cdf4cf758128593c38bfb625db57933d2264d0b239c4f01e03b2a764b5d8b527bf1147e64fdbfec738e8f1e85fe255f065fade4f913e20f", "941ddc4b4d9398a758f9e5ce51d1bb7ea7a41313545e9b837b8d798ce506c20e0545a25a8325d1761a4164a0a4b482122952e9169610a57a12a725c14094e90a", "dea7d5e55e071ff9434dfab68c35b174c7a28522b13e7ae3ace3652a77315b043ebab8abb654fc7829543cb099fe58597bfa903ec0c84c37ee8b6c124fdb5f07", "9fd00adbb14442f95096a8329f413120a19ce057ed306322e01ac85d6633fa095f029ac534922b957ec21666bd7cd210917546bef67fdc9a4b28f6ecea397204"] }


Less details
source code | moneroexplorer