Monero Transaction 4dedaf8f1f546dcd7568d60f8dfdf0c812e02e6e99e170e152f2d09a9f74b63c

Autorefresh is OFF

Tx hash: 4dedaf8f1f546dcd7568d60f8dfdf0c812e02e6e99e170e152f2d09a9f74b63c

Tx prefix hash: 508860ceb60cea51f15063f8ee1f38a91b9a02f3e15418c43a3d8d465a8e211f
Tx public key: 933281ffa82446cfe78812425b3cdb3a221f919820736791649ccfc725cf269b

Transaction 4dedaf8f1f546dcd7568d60f8dfdf0c812e02e6e99e170e152f2d09a9f74b63c was carried out on the Monero network on 2014-06-14 12:54:29. The transaction has 3193244 confirmations. Total output fee is 0.005582814434 XMR.

Timestamp: 1402750469 Timestamp [UTC]: 2014-06-14 12:54:29 Age [y:d:h:m:s]: 10:151:20:11:15
Block: 84980 Fee (per_kB): 0.005582814434 (0.015367747259) Tx size: 0.3633 kB
Tx version: 1 No of confirmations: 3193244 RingCT/type: no
Extra: 01933281ffa82446cfe78812425b3cdb3a221f919820736791649ccfc725cf269b

6 output(s) for total of 0.024417185566 xmr

stealth address amount amount idx tag
00: b9533e09a21152f57cc64cf71a3f44fbc320836f976add15e84e1a6f37772ba9 0.001483437113 0 of 31 -
01: d795925c9b8318cf27d35ccf0335642751865941de37346a71b41e6e16a3efa6 0.001483437113 1 of 31 -
02: 3b3f7317460fb458536fa6ed5420bfd20a445ac6f7a308c81b21d4f3485eb287 0.001483437113 2 of 31 -
03: 54f872f12719e383fd2047c54bcca8ce6040cac771acc6cf52399fb67ba4511b 0.002966874227 0 of 14 -
04: c026bf7a36fdf174d9faa6a4d5faf10c11c5357b1f6322b0e40b124d0a126333 0.007000000000 108020 of 247340 -
05: b49c7e8c31653463bc87729def5e5d070d3ef3a96773f1e7d2af936db0291c90 0.010000000000 214405 of 502466 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-14 11:24:12 till 2014-06-14 13:24:12; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.030000000000 xmr

key image 00: 74ed2a6dabd8a88abab1da314e956863a815aa6827cc282448239e6c011cb521 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 940555a4ddfa858b08456a066d69c24beab4e118c78bc13a502bdab4013731fb 00084948 1 1/112 2014-06-14 12:24:12 10:151:20:41:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 96171 ], "k_image": "74ed2a6dabd8a88abab1da314e956863a815aa6827cc282448239e6c011cb521" } } ], "vout": [ { "amount": 1483437113, "target": { "key": "b9533e09a21152f57cc64cf71a3f44fbc320836f976add15e84e1a6f37772ba9" } }, { "amount": 1483437113, "target": { "key": "d795925c9b8318cf27d35ccf0335642751865941de37346a71b41e6e16a3efa6" } }, { "amount": 1483437113, "target": { "key": "3b3f7317460fb458536fa6ed5420bfd20a445ac6f7a308c81b21d4f3485eb287" } }, { "amount": 2966874227, "target": { "key": "54f872f12719e383fd2047c54bcca8ce6040cac771acc6cf52399fb67ba4511b" } }, { "amount": 7000000000, "target": { "key": "c026bf7a36fdf174d9faa6a4d5faf10c11c5357b1f6322b0e40b124d0a126333" } }, { "amount": 10000000000, "target": { "key": "b49c7e8c31653463bc87729def5e5d070d3ef3a96773f1e7d2af936db0291c90" } } ], "extra": [ 1, 147, 50, 129, 255, 168, 36, 70, 207, 231, 136, 18, 66, 91, 60, 219, 58, 34, 31, 145, 152, 32, 115, 103, 145, 100, 156, 207, 199, 37, 207, 38, 155 ], "signatures": [ "b7970fcff2051e844b4b03a4b916160da22f3afa4882cb45f97b878f4e8bf80157fadab75a461aa44e731bc4a181a2d590c4bd0cef314928bf12730f364f410f"] }


Less details
source code | moneroexplorer