Monero Transaction 2de034a64e8147adc208d7eb82940d39a8ccdea264facd2e84b03a474b6cf265

Autorefresh is OFF

Tx hash: 2de034a64e8147adc208d7eb82940d39a8ccdea264facd2e84b03a474b6cf265

Tx prefix hash: b68e0186dccdeff07b3d8c75907f73312c73fdb846cb173d3ae527434d5d25be
Tx public key: cf6ed4b426765fde96cfb09209b833226c3ce1dee94c0134daa24184248807a3
Payment id: 12f35c5df6adfba1041fe9efa46f808244089086f3dc4837a8fde67a945b1c50

Transaction 2de034a64e8147adc208d7eb82940d39a8ccdea264facd2e84b03a474b6cf265 was carried out on the Monero network on 2014-11-20 09:29:52. The transaction has 2988328 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1416475792 Timestamp [UTC]: 2014-11-20 09:29:52 Age [y:d:h:m:s]: 10:025:02:24:08
Block: 312968 Fee (per_kB): 0.020000000000 (0.024236686391) Tx size: 0.8252 kB
Tx version: 1 No of confirmations: 2988328 RingCT/type: no
Extra: 02210012f35c5df6adfba1041fe9efa46f808244089086f3dc4837a8fde67a945b1c5001cf6ed4b426765fde96cfb09209b833226c3ce1dee94c0134daa24184248807a3

6 output(s) for total of 20.070000000000 xmr

stealth address amount amount idx tag
00: 0667b3268ff9dfc8ef576016860db6f02a121622a2c00f99fa799064b4fc75fa 0.070000000000 107935 of 263947 -
01: 30c29b7c7968681e4545a2a603298248858286f1f7f58ce3d943d9fa64d861f0 0.200000000000 630108 of 1272211 -
02: 7b3daf105a9ea6d032e4d62ef5fdfb39556cea99226d4915ae5f73a4e16f28a6 0.800000000000 201528 of 489955 -
03: 5086667969d5711296ba06a716bab8558444f2f59b4be0c39804a07dfb1767f1 2.000000000000 132174 of 434058 -
04: 107de19081b3aaedbc114ac32fea875ecf6cd1f083a3faa9a7a1b924c04bf66a 7.000000000000 61330 of 285521 -
05: c67621f0d3794189ad4617e6c7a1ba4cf0c91894ff71963cfead13adb5cfea36 10.000000000000 363633 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-19 13:03:03 till 2014-11-20 06:09:53; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|
  • |______________*___________________________________________________________________________________________________________________________________________________________|
  • |_______________________*__________________________________________________________________________________________________________________________________________________|
  • |__________________*_______________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 20.090000000000 xmr

key image 00: 23540f83dcca739a29931bcdd9bfbb88e66e0bf0af86eb14b5f5b11d34967e61 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2d681b09eb9832bdc2e0803ea5f09b45cf4497e2b2d05045df646d9d1484852e 00312680 0 0/4 2014-11-20 05:09:53 10:025:06:44:07
key image 01: 45198951b5ebd822645a9cbe7f1adc83e9d8dd2b3d4d96e9c87ddc977e87bb02 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a93fc09388e1a18cee96de80bad34fb0acbb969af07a62d76fed32ddd76ed3e7 00311864 1 3/5 2014-11-19 14:03:03 10:025:21:50:57
key image 02: 174b7ff2be868e710a521b8c1f24f590d3a0f6bace650c1c9571f05ded990f5a amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cc6a82959d62838666f5dff8aadee1e1e95fd28b3f0670e9c24a72bcbd223817 00311889 1 2/3 2014-11-19 14:27:40 10:025:21:26:20
key image 03: ff55df65c01ba1ee8bb57b706ba081950c517c53d9efb0329dc6ac7c4553df32 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e30428594b0fb43099a3e8f8ddcf022e516da47b4b8b6dbe934276dd8b22f0c9 00311937 0 0/3 2014-11-19 15:17:36 10:025:20:36:24
key image 04: 95dc909d590beded4edcce1c86a49841eabbb7221042295201b3e091228da427 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 912851d2f4bab92e5ea9e22d233d72be82f845a84403e674cc35465d2790e66a 00311907 1 1/6 2014-11-19 14:47:46 10:025:21:06:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000000, "key_offsets": [ 363305 ], "k_image": "23540f83dcca739a29931bcdd9bfbb88e66e0bf0af86eb14b5f5b11d34967e61" } }, { "key": { "amount": 90000000000, "key_offsets": [ 123173 ], "k_image": "45198951b5ebd822645a9cbe7f1adc83e9d8dd2b3d4d96e9c87ddc977e87bb02" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 145090 ], "k_image": "174b7ff2be868e710a521b8c1f24f590d3a0f6bace650c1c9571f05ded990f5a" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 145148 ], "k_image": "ff55df65c01ba1ee8bb57b706ba081950c517c53d9efb0329dc6ac7c4553df32" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 132118 ], "k_image": "95dc909d590beded4edcce1c86a49841eabbb7221042295201b3e091228da427" } } ], "vout": [ { "amount": 70000000000, "target": { "key": "0667b3268ff9dfc8ef576016860db6f02a121622a2c00f99fa799064b4fc75fa" } }, { "amount": 200000000000, "target": { "key": "30c29b7c7968681e4545a2a603298248858286f1f7f58ce3d943d9fa64d861f0" } }, { "amount": 800000000000, "target": { "key": "7b3daf105a9ea6d032e4d62ef5fdfb39556cea99226d4915ae5f73a4e16f28a6" } }, { "amount": 2000000000000, "target": { "key": "5086667969d5711296ba06a716bab8558444f2f59b4be0c39804a07dfb1767f1" } }, { "amount": 7000000000000, "target": { "key": "107de19081b3aaedbc114ac32fea875ecf6cd1f083a3faa9a7a1b924c04bf66a" } }, { "amount": 10000000000000, "target": { "key": "c67621f0d3794189ad4617e6c7a1ba4cf0c91894ff71963cfead13adb5cfea36" } } ], "extra": [ 2, 33, 0, 18, 243, 92, 93, 246, 173, 251, 161, 4, 31, 233, 239, 164, 111, 128, 130, 68, 8, 144, 134, 243, 220, 72, 55, 168, 253, 230, 122, 148, 91, 28, 80, 1, 207, 110, 212, 180, 38, 118, 95, 222, 150, 207, 176, 146, 9, 184, 51, 34, 108, 60, 225, 222, 233, 76, 1, 52, 218, 162, 65, 132, 36, 136, 7, 163 ], "signatures": [ "e8d2f5799605489964edcc5fe894fa1d96fde2a7ab56dbca5dd64e7785192b0d53c12bc23112ce980898969e5d0575fc770e4526feb8063ba56e387b8747cb05", "682f9cf0918d7c25bdf2f9b8870e903a51251e991b53331ea7d2b7a8b486710b3e975e3d2c9b9e8e819d18eedfa31da527c32c68b66b273db5b8d59eb85b6208", "eece80f5e237b76ad5fb8676c36d71acc4ade14a824bb90555f04643d439c401cff7ecebd5c145d46766ce69b76060914d18c40f2aa7bd7e1cd01d5c02bb1807", "27bed5fd3dbe5ff2d70059edc53c6a0772533153fa0d4f39dbbff357de82310d11ac38443aa4a0321165f0c57c3ebcf793aded009c073186c2ecf2e89e8d0604", "fa78ebe0be1aca6b7ae01f9add29390ebaba93c7e10fe62396c76a4a993afa0a1990cb89490261d95656d7b34c409e71248cf56c16ae8c7a0331c3ac1bd3f105"] }


Less details
source code | moneroexplorer