Monero Transaction 4211cdac1ce4c388d80a276f1314723a0442d212b7e28902f89ef09085aae709

Autorefresh is OFF

Tx hash: 4211cdac1ce4c388d80a276f1314723a0442d212b7e28902f89ef09085aae709

Tx prefix hash: f095329f999d4df84705d1b28e02ad072b929d498b6df64cfd89e7781b3db1fc
Tx public key: 8f0d3fce8a91fe47474e7ebbb9295ca213144843803df2f399cde97a3eded5cc
Payment id: 8910101685bb4c3fc54e38fbd8fc19b476aa29c23574acb9a0f3127475f0e75c

Transaction 4211cdac1ce4c388d80a276f1314723a0442d212b7e28902f89ef09085aae709 was carried out on the Monero network on 2014-06-28 19:41:09. The transaction has 3197166 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1403984469 Timestamp [UTC]: 2014-06-28 19:41:09 Age [y:d:h:m:s]: 10:171:22:30:30
Block: 105731 Fee (per_kB): 0.010000000000 (0.018652094718) Tx size: 0.5361 kB
Tx version: 1 No of confirmations: 3197166 RingCT/type: no
Extra: 0221008910101685bb4c3fc54e38fbd8fc19b476aa29c23574acb9a0f3127475f0e75c018f0d3fce8a91fe47474e7ebbb9295ca213144843803df2f399cde97a3eded5cc

4 output(s) for total of 1.690000000000 xmr

stealth address amount amount idx tag
00: 20c6f216de7459f90b14d67870eb4e13a1b235f8af48d3abfd099f3e546e458b 0.010000000000 308353 of 502466 -
01: ca0416443b1f9ef1de9b9828464ab74c85d6f22b8396429e9f50f5ce0cf3a771 0.080000000000 72349 of 269576 -
02: 179f5bf4d139e5d215ad956cb1d708b467dabe7fa492d72902238b27c9f39886 0.600000000000 42282 of 650760 -
03: ef1c4d0026b1aeeb01fb07152a8fec037acbdf05e8b97980541bd3b43152e4e4 1.000000000000 55001 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-28 15:32:06 till 2014-06-28 19:01:49; resolution: 0.00 days)

  • |_________________________________________________*________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________*________________________________________________|
  • |_________________________________________________________________________________________________________________________*________________________________________________|

3 inputs(s) for total of 1.700000000000 xmr

key image 00: 52bc9d0c3d0d107e82e03a44005a0038c50358984431a22c2976690aa2b66e4e amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 701918f4cc9f983184461668e6d7d26b4b4308c58cb7813c77fe528925c1cc13 00105531 1 7/54 2014-06-28 16:32:06 10:172:01:39:33
key image 01: fb4883dc2ed6ba033683a84782b4b00f74f11c54c9c5cd82e6b55be19203241e amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b796c36eecf3c272735683a7520b6d394fb2ee5599c2846a49972a3c55bced88 00105626 1 7/45 2014-06-28 18:01:49 10:172:00:09:50
key image 02: 78f91a2a533b56bd77d516aea6dd3406dcca4eb16891c682918effd3f46ce88f amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 237495e72c9bdbf335f0ed793b8d77fbf64cb1fb5fd76bb425a3d7aaeb922226 00105626 1 7/45 2014-06-28 18:01:49 10:172:00:09:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 200062 ], "k_image": "52bc9d0c3d0d107e82e03a44005a0038c50358984431a22c2976690aa2b66e4e" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 54802 ], "k_image": "fb4883dc2ed6ba033683a84782b4b00f74f11c54c9c5cd82e6b55be19203241e" } }, { "key": { "amount": 600000000000, "key_offsets": [ 42129 ], "k_image": "78f91a2a533b56bd77d516aea6dd3406dcca4eb16891c682918effd3f46ce88f" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "20c6f216de7459f90b14d67870eb4e13a1b235f8af48d3abfd099f3e546e458b" } }, { "amount": 80000000000, "target": { "key": "ca0416443b1f9ef1de9b9828464ab74c85d6f22b8396429e9f50f5ce0cf3a771" } }, { "amount": 600000000000, "target": { "key": "179f5bf4d139e5d215ad956cb1d708b467dabe7fa492d72902238b27c9f39886" } }, { "amount": 1000000000000, "target": { "key": "ef1c4d0026b1aeeb01fb07152a8fec037acbdf05e8b97980541bd3b43152e4e4" } } ], "extra": [ 2, 33, 0, 137, 16, 16, 22, 133, 187, 76, 63, 197, 78, 56, 251, 216, 252, 25, 180, 118, 170, 41, 194, 53, 116, 172, 185, 160, 243, 18, 116, 117, 240, 231, 92, 1, 143, 13, 63, 206, 138, 145, 254, 71, 71, 78, 126, 187, 185, 41, 92, 162, 19, 20, 72, 67, 128, 61, 242, 243, 153, 205, 233, 122, 62, 222, 213, 204 ], "signatures": [ "c2f08b04b7c864b9d4a44883b4aabb1f57b7e28ce88d3b857ed135d7147ab80076c5a6536c0c1238fe685bc9e537b0cb49fb2365b7b96a91fce4b7d37274620a", "6fb099978a054535c4e16ec7cf366ba0570d7036460f520a72f12198e7e67e02d053df97544d382bc49c91f1cd4132967452cb7f8881db9da569ee8148aa3c0e", "b8dc7621318751a477b5291eb31eb0e8f638877b4272ff0878a6ac9b43baec0000f1e17bbc93c28a4b4a0bebe841c1ffaecb7d30cea319cd0d10366977cef40a"] }


Less details
source code | moneroexplorer