Monero Transaction 2f1a6815684d5e388e8317ee18ba289e1d4050fc055a732991f5658bfcda91e7

Autorefresh is OFF

Tx hash: 2f1a6815684d5e388e8317ee18ba289e1d4050fc055a732991f5658bfcda91e7

Tx prefix hash: 321558f15d3a17cc31532a5915cb02b27e43a9ff6fec3da042435ac0dcd9d399
Tx public key: c96e6c337e520e34307ca516629284cccc54d62b125a7bdab78de7664d98cda5

Transaction 2f1a6815684d5e388e8317ee18ba289e1d4050fc055a732991f5658bfcda91e7 was carried out on the Monero network on 2014-06-14 07:28:24. The transaction has 3216737 confirmations. Total output fee is 0.000010000100 XMR.

Timestamp: 1402730904 Timestamp [UTC]: 2014-06-14 07:28:24 Age [y:d:h:m:s]: 10:184:05:32:59
Block: 84606 Fee (per_kB): 0.000010000100 (0.000016732193) Tx size: 0.5977 kB
Tx version: 1 No of confirmations: 3216737 RingCT/type: no
Extra: 01c96e6c337e520e34307ca516629284cccc54d62b125a7bdab78de7664d98cda5

4 output(s) for total of 1.080040000000 xmr

stealth address amount amount idx tag
00: ac07fb9b049dc7a9aac498d09b6da18bfb1047b3c4d85ca38a91634c043ccbfd 0.000040000000 34237 of 58748 -
01: 55c3264514847d99636a85a813f8ad507666048970e35390ea46107ccf1e2881 0.090000000000 43348 of 317822 -
02: e9447b5b9cf42eb0ad371e301dea7870c2539b2d8da7b547d859258fd7ac1a92 0.090000000000 43349 of 317822 -
03: 73fd2f12e51d4e85def17316f88c2c30f905413aa728ed69290ff90df1ff54fe 0.900000000000 17434 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-06 07:17:31 till 2014-06-12 06:35:31; resolution: 0.04 days)

  • |___________________________________________________________________________________________________________________________________________*______________________________|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

4 inputs(s) for total of 1.080050000100 xmr

key image 00: eabbf400bbce28e283c277c1cb8ab3828517975d2469ec28014dec0a185e2b23 amount: 0.000000000100
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 14de384555be5ec5b9d6e6413da0923a2299d967dec922bbfba47c288e0d4906 00080117 1 3/105 2014-06-11 05:02:51 10:187:07:58:32
key image 01: ff71e1e324c1b08f95fe201a318b3971739991f4f0da5158456da453b50824e3 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a4f9c22d1de269ca280eeeb8dc79b742ef75a70c6ab6f6c700a6c27966349ff2 00073051 1 32/3 2014-06-06 08:17:31 10:192:04:43:52
key image 02: 85dcab01f0b9128f5eed2a39b913a4718d9220895fde528833a3e4946b86c445 amount: 0.000050000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ef1af11e03593dc4a979a2474df1553287e3671b866e92ee3a3668cc23aa6009 00081202 1 81/15 2014-06-12 00:30:13 10:186:12:31:10
key image 03: 55a2f07914e025e1b3f0815f58748c0344ba821e070411198ea888a7a5b34836 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bc7e243861d3158298e75ca31d8bedcdaabbea837f6aacff1eb6c18dd1d36cdf 00081546 1 214/3 2014-06-12 05:35:31 10:186:07:25:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100, "key_offsets": [ 393 ], "k_image": "eabbf400bbce28e283c277c1cb8ab3828517975d2469ec28014dec0a185e2b23" } }, { "key": { "amount": 80000000000, "key_offsets": [ 24075 ], "k_image": "ff71e1e324c1b08f95fe201a318b3971739991f4f0da5158456da453b50824e3" } }, { "key": { "amount": 50000000, "key_offsets": [ 33645 ], "k_image": "85dcab01f0b9128f5eed2a39b913a4718d9220895fde528833a3e4946b86c445" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 17762 ], "k_image": "55a2f07914e025e1b3f0815f58748c0344ba821e070411198ea888a7a5b34836" } } ], "vout": [ { "amount": 40000000, "target": { "key": "ac07fb9b049dc7a9aac498d09b6da18bfb1047b3c4d85ca38a91634c043ccbfd" } }, { "amount": 90000000000, "target": { "key": "55c3264514847d99636a85a813f8ad507666048970e35390ea46107ccf1e2881" } }, { "amount": 90000000000, "target": { "key": "e9447b5b9cf42eb0ad371e301dea7870c2539b2d8da7b547d859258fd7ac1a92" } }, { "amount": 900000000000, "target": { "key": "73fd2f12e51d4e85def17316f88c2c30f905413aa728ed69290ff90df1ff54fe" } } ], "extra": [ 1, 201, 110, 108, 51, 126, 82, 14, 52, 48, 124, 165, 22, 98, 146, 132, 204, 204, 84, 214, 43, 18, 90, 123, 218, 183, 141, 231, 102, 77, 152, 205, 165 ], "signatures": [ "a82efa74fd6a3ed87cf3e5fef66d87a96c8db392fd9ec720b6c8136074c16f0d2742ed0e027c05a6bec218035571d7290994d717ee3474fe8f0f519a6a63730f", "5f8e7f4cca10c4b2dd659968a0841239c1c4445af031ba6649550ca130723f0adfb2c66d6472e03cde27cdf749c4a1ce7693579b0b50e53ecf7af77c37528109", "9bb55da5e32cc2b8aeb88b0a6277dd26e068ddd64bf7a4cf2fa08df8482ec30318fccf2fece508cf343ea594d37d29405eaacd0cecb00a8568dea688418d3f06", "2c5f56ff4b1924dfe6edc2ad19d100cb999e45d834d784cb8e7a3ae5a5e7c60cc8b7b28f37f48a54c46684d14aec95614e3821f7e56bd1719bd7d33e1c4ecb02"] }


Less details
source code | moneroexplorer