Monero Transaction 2f13290ba5307b9df4400eb14833011da599ca26e69a255432c23a6c8c3a1699

Autorefresh is OFF

Tx hash: 2f13290ba5307b9df4400eb14833011da599ca26e69a255432c23a6c8c3a1699

Tx prefix hash: 74c36c061829fc9a100f0efe5147bc402f53269af79496acefdb259acdb886d6
Tx public key: 8036a88ae243fdf64878695a8d46438af6509723ac753f4d0a6657fef20b5ed2
Payment id: 650ad092c910ec5f6560f9a363559b198d3659d6e666f5a724a4d337435e7dbc

Transaction 2f13290ba5307b9df4400eb14833011da599ca26e69a255432c23a6c8c3a1699 was carried out on the Monero network on 2014-05-22 22:45:32. The transaction has 3226412 confirmations. Total output fee is 0.000001914239 XMR.

Timestamp: 1400798732 Timestamp [UTC]: 2014-05-22 22:45:32 Age [y:d:h:m:s]: 10:174:18:23:31
Block: 52068 Fee (per_kB): 0.000001914239 (0.000002014574) Tx size: 0.9502 kB
Tx version: 1 No of confirmations: 3226412 RingCT/type: no
Extra: 022100650ad092c910ec5f6560f9a363559b198d3659d6e666f5a724a4d337435e7dbc018036a88ae243fdf64878695a8d46438af6509723ac753f4d0a6657fef20b5ed2

7 output(s) for total of 7.990299000000 xmr

stealth address amount amount idx tag
00: a90974fca9ae0b7351fed9edbf7ff984503467c578d20bb94875fafa7ac4e002 0.000009000000 8557 of 46395 -
01: b81fd946a1c97ee28a6b30f15d32d399ec64a54a541a76307ef8cfba511fe1bb 0.000090000000 8288 of 61123 -
02: 8ac3d930927b6356c02b35f95d5e3886152e7242fa334cbb0fc880ca1ac0b65f 0.000200000000 7962 of 78038 -
03: 20029af15164821613c654e8c99e78f35491e47d643645afdcac4498e71c6b75 0.090000000000 6627 of 317822 -
04: 35bf5032692a4376ebd26e1968140425446b5898bccef8216848cf6bc2cbe744 0.900000000000 7056 of 454894 -
05: d29a0ee051675a387c036e2f78e3e72f2937d039f6e3ea16b8d46b15ca5cd7f2 2.000000000000 765 of 434057 -
06: 56776ea35850553584ad0347ea11917a8ccf98ca16202ea90202f54b4b4fff40 5.000000000000 904 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-20 06:03:35 till 2014-05-18 23:53:42; resolution: 0.17 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|

6 inputs(s) for total of 7.990300914239 xmr

key image 00: 833b70399437bcdc1af3ebc2e933b650ba7b6584301553d2b04683a4020034ff amount: 0.000000914239
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61e49b72af88474d0c26c8a64e942875ae09f1b9762ba7b6c07a35899080db0d 00002812 0 0/8 2014-04-20 07:03:35 10:207:10:05:28
key image 01: 82b7500d5f6ecbd353904dfa74a04f2face3909b8684e7c0cc212065084f0ca5 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bcb11e4c1109a51bf4d87b175c9c5c6834c3ba872ec00900e80067d189fd9c5b 00045984 1 25/677 2014-05-18 22:17:25 10:178:18:51:38
key image 02: 55737d1a014ae5cb5d4ee92bfb8735162ce787e1c3851445d47b9deecf24ff33 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 840362c0789cd83e27ea582060baba0de8be04dc09830eee79dca27e270a9076 00046022 1 10/538 2014-05-18 22:53:42 10:178:18:15:21
key image 03: 4ae3a7243063a15f97d33fb0e8d36b645f7a57d4fe377b9f3d91ee9f732b3ed1 amount: 0.000300000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fee69ef9c878baade829bad80372f4270622fbcf6cab779a0520bad8ea92349c 00045984 1 25/677 2014-05-18 22:17:25 10:178:18:51:38
key image 04: 000f5fd29a7ccba2c8300075bb56711efb5b0c5f34470e171245ea9c94af3d9e amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c813edb1d43167499d18e3d18bdcda95049491d94c6ddc7785f0b3ed524120f8 00002812 0 0/8 2014-04-20 07:03:35 10:207:10:05:28
key image 05: 2b56931b947e262be1ae135d6571fd656e6f45b1223388eddb8047d73d9a7237 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2843e0fdbe5abe461a3cff85571ee5fb2487dad973bb02cd618890d4d4f5713d 00003038 0 0/8 2014-04-20 10:51:41 10:207:06:17:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 914239, "key_offsets": [ 0 ], "k_image": "833b70399437bcdc1af3ebc2e933b650ba7b6584301553d2b04683a4020034ff" } }, { "key": { "amount": 400000000000, "key_offsets": [ 6379 ], "k_image": "82b7500d5f6ecbd353904dfa74a04f2face3909b8684e7c0cc212065084f0ca5" } }, { "key": { "amount": 90000000000, "key_offsets": [ 5034 ], "k_image": "55737d1a014ae5cb5d4ee92bfb8735162ce787e1c3851445d47b9deecf24ff33" } }, { "key": { "amount": 300000000, "key_offsets": [ 4907 ], "k_image": "4ae3a7243063a15f97d33fb0e8d36b645f7a57d4fe377b9f3d91ee9f732b3ed1" } }, { "key": { "amount": 500000000000, "key_offsets": [ 2814 ], "k_image": "000f5fd29a7ccba2c8300075bb56711efb5b0c5f34470e171245ea9c94af3d9e" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 3035 ], "k_image": "2b56931b947e262be1ae135d6571fd656e6f45b1223388eddb8047d73d9a7237" } } ], "vout": [ { "amount": 9000000, "target": { "key": "a90974fca9ae0b7351fed9edbf7ff984503467c578d20bb94875fafa7ac4e002" } }, { "amount": 90000000, "target": { "key": "b81fd946a1c97ee28a6b30f15d32d399ec64a54a541a76307ef8cfba511fe1bb" } }, { "amount": 200000000, "target": { "key": "8ac3d930927b6356c02b35f95d5e3886152e7242fa334cbb0fc880ca1ac0b65f" } }, { "amount": 90000000000, "target": { "key": "20029af15164821613c654e8c99e78f35491e47d643645afdcac4498e71c6b75" } }, { "amount": 900000000000, "target": { "key": "35bf5032692a4376ebd26e1968140425446b5898bccef8216848cf6bc2cbe744" } }, { "amount": 2000000000000, "target": { "key": "d29a0ee051675a387c036e2f78e3e72f2937d039f6e3ea16b8d46b15ca5cd7f2" } }, { "amount": 5000000000000, "target": { "key": "56776ea35850553584ad0347ea11917a8ccf98ca16202ea90202f54b4b4fff40" } } ], "extra": [ 2, 33, 0, 101, 10, 208, 146, 201, 16, 236, 95, 101, 96, 249, 163, 99, 85, 155, 25, 141, 54, 89, 214, 230, 102, 245, 167, 36, 164, 211, 55, 67, 94, 125, 188, 1, 128, 54, 168, 138, 226, 67, 253, 246, 72, 120, 105, 90, 141, 70, 67, 138, 246, 80, 151, 35, 172, 117, 63, 77, 10, 102, 87, 254, 242, 11, 94, 210 ], "signatures": [ "48613aa6ff57013a334d9ea6ef1661ad48f12c3846f73a15bbd342f750a2e9044b4f98c7e9b397269ae3e0b9ff3e9e62f8a6c66926a234f9a22b25ea5ee1a204", "62bbb12181d8fc171c0ac48d678c6192ff2558a793e5f1255449be07d20b170bd9f250e72b593d4e1d01bfb29dc02738de71b47e085efa8d27abaa7d183b6109", "bf1695a19f983668632798e973d5425170c82c643e79f3ddeb698cc81e5033077740ca57b6e70ff4d03b83b8e41b5f233865330cc5512f6927b7768c6a859d04", "74632134627612e0cea88d9ee5e409a595452322c55578d0b79807a6634c210030e9528e5162af4ef89ab2071f9dc91be779959267bc8f157512f862688e4a0d", "5699c7908158437ae3984a3b56aa156333175c54dffb38c3fb72b5be628c360b2585187fcddd36c7b4197b5efc67c16ff0510208eeedafa90783a3caa89d7d0e", "8bccd4f8dcf8af4153388d8d364b52f95c769bee8f38d92e36913a25dd64bd08b5659953cebd9a6e651ac8110e969eb6aa42e6d5486a74a5bdb97404c8823f0a"] }


Less details
source code | moneroexplorer