Monero Transaction 2f0fa85084687413ef135fd51460731327a79e06222610bf2f0455d56df0b42a

Autorefresh is OFF

Tx hash: 2f0fa85084687413ef135fd51460731327a79e06222610bf2f0455d56df0b42a

Tx prefix hash: 9691f353dcd676f9a5caa3ca88f5bd120cdd1bae114a7da466f1d91d8c780edc
Tx public key: e2dccb2ee6ed9111036eb52ead47d5bdd43315d60c13a74d367f1b7eb49ab172

Transaction 2f0fa85084687413ef135fd51460731327a79e06222610bf2f0455d56df0b42a was carried out on the Monero network on 2016-02-13 01:18:07. The transaction has 2347501 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1455326287 Timestamp [UTC]: 2016-02-13 01:18:07 Age [y:d:h:m:s]: 08:305:08:40:54
Block: 953735 Fee (per_kB): 0.010000000000 (0.015215453195) Tx size: 0.6572 kB
Tx version: 1 No of confirmations: 2347501 RingCT/type: no
Extra: 01e2dccb2ee6ed9111036eb52ead47d5bdd43315d60c13a74d367f1b7eb49ab172

8 output(s) for total of 7.990000000000 xmr

stealth address amount amount idx tag
00: b28c829e034d5106852cf7bbb7fb91846f9fb52c9fbb835ea39a8d566e3626a0 0.090000000000 216141 of 317822 -
01: 4151d7ed088cc525ce48da135e548f8b170435c52c6187f369b5c62659a80873 0.100000000000 863259 of 982315 -
02: 79038036e2a514d2da7d0789778d8ad673e55a504a1ed07f21e91cb20b39fbdd 0.400000000000 555501 of 688584 -
03: 1fe680c68de6081b9207251c095bcc339803fa69f0958f935e207f0f5863eee3 0.500000000000 947145 of 1118624 -
04: 49a10be874b9f52de4b34b41ff100bad8525ceb1a13c1c0e8a23d6537565d43d 0.500000000000 947146 of 1118624 -
05: 8137c445e6ffe150d2719db9c0318a1d4aec936768aaba00755b6d032e66dfdc 0.600000000000 547801 of 650760 -
06: 1f52b4e1236d52c3b9066b27f4a54fec35a24efb3c9bfd9d6b8798b89692fbf9 0.800000000000 380983 of 489955 -
07: 04450fb1c0543b915e33ea0d4f5f1d7e194cfa2b7384caf8245da7134a0ee065 5.000000000000 200264 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2016-02-08 14:01:00 till 2016-02-12 17:14:26; resolution: 0.02 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 8.000000000000 xmr

key image 00: a7c2c714982daf054ebc9c7aea287dbf37f604326278d313aba0db1cbae5734d amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8cb0f595f9e02f16d284da4d2c244d2c668d0a0989c503bafe29c190c504effd 00953234 0 0/3 2016-02-12 16:14:26 08:305:17:44:35
key image 01: e2b291b4323f3413bf3b5c3e8bb18ef1582f26189dd1ca16c9217ee1e2fdae0a amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cd354fa7bf83d117ac422172015f434001cfcf1d3ade61c36037f23385e53e16 00953185 0 0/3 2016-02-12 15:33:22 08:305:18:25:39
key image 02: 80e8c862196bee09d7cac7e96797ab4ab65369b13c32c10848115bc174c4072a amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 050ce3d97398448c6750a3cbdaa2c9963afd926250e42f38409be2eb0dea1190 00947498 1 3/5 2016-02-08 15:01:00 08:309:18:58:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 862689 ], "k_image": "a7c2c714982daf054ebc9c7aea287dbf37f604326278d313aba0db1cbae5734d" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 226368 ], "k_image": "e2b291b4323f3413bf3b5c3e8bb18ef1582f26189dd1ca16c9217ee1e2fdae0a" } }, { "key": { "amount": 900000000000, "key_offsets": [ 332800 ], "k_image": "80e8c862196bee09d7cac7e96797ab4ab65369b13c32c10848115bc174c4072a" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "b28c829e034d5106852cf7bbb7fb91846f9fb52c9fbb835ea39a8d566e3626a0" } }, { "amount": 100000000000, "target": { "key": "4151d7ed088cc525ce48da135e548f8b170435c52c6187f369b5c62659a80873" } }, { "amount": 400000000000, "target": { "key": "79038036e2a514d2da7d0789778d8ad673e55a504a1ed07f21e91cb20b39fbdd" } }, { "amount": 500000000000, "target": { "key": "1fe680c68de6081b9207251c095bcc339803fa69f0958f935e207f0f5863eee3" } }, { "amount": 500000000000, "target": { "key": "49a10be874b9f52de4b34b41ff100bad8525ceb1a13c1c0e8a23d6537565d43d" } }, { "amount": 600000000000, "target": { "key": "8137c445e6ffe150d2719db9c0318a1d4aec936768aaba00755b6d032e66dfdc" } }, { "amount": 800000000000, "target": { "key": "1f52b4e1236d52c3b9066b27f4a54fec35a24efb3c9bfd9d6b8798b89692fbf9" } }, { "amount": 5000000000000, "target": { "key": "04450fb1c0543b915e33ea0d4f5f1d7e194cfa2b7384caf8245da7134a0ee065" } } ], "extra": [ 1, 226, 220, 203, 46, 230, 237, 145, 17, 3, 110, 181, 46, 173, 71, 213, 189, 212, 51, 21, 214, 12, 19, 167, 77, 54, 127, 27, 126, 180, 154, 177, 114 ], "signatures": [ "1640121d0ba2cf95d6d8ca99d2257c41766e84fcd6b27d6357a0d530c64bc30dd80ce76ce1c43de21d44cf1640566457985ee8dc351ebf5c364bf5d266b8510c", "f409c47bab15d07e598b5298ed334a53e5df8155460eafa8a2be4b5e665f840aa627ec420ac02dbacdfe7785c28c1a7876eb1b07e4a2f17ab658aa35108b2306", "795488e78ae0e5449271667a7430d84638bb6ce683eebae4a5803f82368bc70595960e44a0bc269ff133331c753e6bb0814bda3854f0751f5d7dbb4125ebb708"] }


Less details
source code | moneroexplorer