Monero Transaction 2f57c4f0440f32df15dc9a45fe3ad72c805b200e8475502015b26a3e8f84f0f6

Autorefresh is OFF

Tx hash: 2f57c4f0440f32df15dc9a45fe3ad72c805b200e8475502015b26a3e8f84f0f6

Tx prefix hash: 9a123d163350c5e80076ce8bfb3322b7bd0a262fe2f81361e45851bc9f301492
Tx public key: 44b6487bf1f995448d09558a71cd225fe4dbc998b28760c5609e4f407b0c848a
Payment id: b753413ab403b70a760c5565dd77127b903c31d4e31ab852084a5cab2db79546

Transaction 2f57c4f0440f32df15dc9a45fe3ad72c805b200e8475502015b26a3e8f84f0f6 was carried out on the Monero network on 2014-07-17 15:06:14. The transaction has 3147364 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405609574 Timestamp [UTC]: 2014-07-17 15:06:14 Age [y:d:h:m:s]: 10:121:14:19:39
Block: 132863 Fee (per_kB): 0.010000000000 (0.028054794521) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3147364 RingCT/type: no
Extra: 022100b753413ab403b70a760c5565dd77127b903c31d4e31ab852084a5cab2db795460144b6487bf1f995448d09558a71cd225fe4dbc998b28760c5609e4f407b0c848a

2 output(s) for total of 0.190000000000 xmr

stealth address amount amount idx tag
00: 9b32188b7d958d6843c2225dad22186c04546e478e89dd78c14ebed5e6e09342 0.090000000000 82717 of 317822 -
01: ad986aca831a457f844f197053da9ded9dd82908563616b485f7909177d5a8a6 0.100000000000 286570 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-14 01:20:09 till 2014-07-17 10:21:23; resolution: 0.02 days)

  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |___*______________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.200000000000 xmr

key image 00: 101c96739ad2042dc0c8e981522c06362b88902a5c84430f43fb07c0aa3e8d8b amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 51af8a209493ce89c204ac983dc621dc56ee19e07afbfd59a257832a908e5eae 00132489 1 5/57 2014-07-17 09:21:23 10:121:20:04:30
key image 01: ddb961801d5273cd43ace14a4c7bb351ce45eb5478261fb375bab839ce604129 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 15103a155f4d2b821edd575f821d30da1b66a0b96f56a6db200d6e903a4882c1 00127679 1 8/44 2014-07-14 02:20:09 10:125:03:05:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 285619 ], "k_image": "101c96739ad2042dc0c8e981522c06362b88902a5c84430f43fb07c0aa3e8d8b" } }, { "key": { "amount": 100000000000, "key_offsets": [ 273769 ], "k_image": "ddb961801d5273cd43ace14a4c7bb351ce45eb5478261fb375bab839ce604129" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "9b32188b7d958d6843c2225dad22186c04546e478e89dd78c14ebed5e6e09342" } }, { "amount": 100000000000, "target": { "key": "ad986aca831a457f844f197053da9ded9dd82908563616b485f7909177d5a8a6" } } ], "extra": [ 2, 33, 0, 183, 83, 65, 58, 180, 3, 183, 10, 118, 12, 85, 101, 221, 119, 18, 123, 144, 60, 49, 212, 227, 26, 184, 82, 8, 74, 92, 171, 45, 183, 149, 70, 1, 68, 182, 72, 123, 241, 249, 149, 68, 141, 9, 85, 138, 113, 205, 34, 95, 228, 219, 201, 152, 178, 135, 96, 197, 96, 158, 79, 64, 123, 12, 132, 138 ], "signatures": [ "2def28f8f35ea8f9d6cefa77f1b82462dfef115a99f19a4a2e49404cd6ac8a08a52195496d7ef41d85911192ce5011e90671f7ed0774af66927420aeead8b10f", "9f8790bf3d62fb53600d9b2aee7b7800fee111e26611d13b77b279c49d43750c2023cff512b31c5fc7c75cd1e154f0bf06eb98a4ef4e0ce1d585f31911a56c03"] }


Less details
source code | moneroexplorer