Monero Transaction 4ef4f6ae9620213cf8389b5139a6f4b2c58cbff0565dfaf90203f0d993ae3752

Autorefresh is OFF

Tx hash: 4ef4f6ae9620213cf8389b5139a6f4b2c58cbff0565dfaf90203f0d993ae3752

Tx prefix hash: 0d6fc14659a1807d52c0a2b4e0451c1738e7111088bc65637681482a6b127cd4
Tx public key: d5cfb30dbba120b6603c13812fa3611ea790257f74e832dfdc300e0d19676f1d
Payment id: 86c2b196681dd2bb8cd141f009ec771d6b04df3ef7ea1993b5c53c8481398447

Transaction 4ef4f6ae9620213cf8389b5139a6f4b2c58cbff0565dfaf90203f0d993ae3752 was carried out on the Monero network on 2016-09-05 06:51:34. The transaction has 2158519 confirmations. Total output fee is 0.030000000000 XMR.

Timestamp: 1473058294 Timestamp [UTC]: 2016-09-05 06:51:34 Age [y:d:h:m:s]: 08:081:05:23:21
Block: 1129146 Fee (per_kB): 0.030000000000 (0.040960000000) Tx size: 0.7324 kB
Tx version: 1 No of confirmations: 2158519 RingCT/type: no
Extra: 02210086c2b196681dd2bb8cd141f009ec771d6b04df3ef7ea1993b5c53c848139844701d5cfb30dbba120b6603c13812fa3611ea790257f74e832dfdc300e0d19676f1d

5 output(s) for total of 6.470000000000 xmr

stealth address amount amount idx tag
00: fb17a5b12defb5c5d9e29aae72010635121533e538e7df7c81d8b27aece3e6df 0.070000000000 218875 of 263947 -
01: 256623cb7ed00887c1cc6339a46bed51bc9882b0543f49ce8ddec4c8f4b6c57e 0.700000000000 465241 of 514467 -
02: 24b61a43675813955fd53a4d3da2a06c87d2b30c55059d3305c47223a944bc35 0.700000000000 465242 of 514467 -
03: c8fb212619bc482967c3e0e9d3f99998b200c39f4f12a64f8c7e451adae606e6 2.000000000000 394772 of 434057 -
04: 35938d306ee0ca303e4598b8e462541e049f287b26a9348626fa08f1f9b63be2 3.000000000000 270263 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-24 12:08:04 till 2016-09-05 03:41:47; resolution: 4.55 days)

  • |_______*____*____________________________________________________________________________________________________________________________________________________________*|
  • |_*______*________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 6.500000000000 xmr

key image 00: a399d69ab14e16a26135c76077436a785892bc8c09b8818aa8711af08e2a3fe4 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7196f11110c6a386ba7f48875cdc58139092371a38c1123518bca03c196aa62b 00187603 2 6/93 2014-08-24 15:34:24 10:093:20:40:31
- 01: 4666f63df988f3ab1547cfb5a1ed0d4b909acfca017e040d22892515f110b76b 00219608 1 75/347 2014-09-16 00:30:46 10:071:11:44:09
- 02: 84313022d76f51ef02081081dcb628ff768854e4c8cbe3d033eaaf4ea949f38d 01129019 3 2/4 2016-09-05 02:34:49 08:081:09:40:06
key image 01: 8e557ff01b8bb7ae77f2e254fb96ba0c973e93f1141dec83acae6d7ba123b0c5 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ea19c6c9c760f4f1209b5ec908cd28fb423ea8ab945b18b6b8c9c6d332d7a9a7 00142837 1 41/72 2014-07-24 13:08:04 10:124:23:06:51
- 01: 884f23564fe16e8aa4f95d00e88d3ab1a85a0b82a81e88d2cff5900798c76ad7 00191584 1 21/3 2014-08-27 10:32:09 10:091:01:42:46
- 02: eae3727e67eb849cb7a882af83a8a7981628ac12c645f04f7592e26379e0f49e 01129022 3 1/5 2016-09-05 02:41:47 08:081:09:33:08
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 252145, 65426, 720792 ], "k_image": "a399d69ab14e16a26135c76077436a785892bc8c09b8818aa8711af08e2a3fe4" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 71104, 7148, 107264 ], "k_image": "8e557ff01b8bb7ae77f2e254fb96ba0c973e93f1141dec83acae6d7ba123b0c5" } } ], "vout": [ { "amount": 70000000000, "target": { "key": "fb17a5b12defb5c5d9e29aae72010635121533e538e7df7c81d8b27aece3e6df" } }, { "amount": 700000000000, "target": { "key": "256623cb7ed00887c1cc6339a46bed51bc9882b0543f49ce8ddec4c8f4b6c57e" } }, { "amount": 700000000000, "target": { "key": "24b61a43675813955fd53a4d3da2a06c87d2b30c55059d3305c47223a944bc35" } }, { "amount": 2000000000000, "target": { "key": "c8fb212619bc482967c3e0e9d3f99998b200c39f4f12a64f8c7e451adae606e6" } }, { "amount": 3000000000000, "target": { "key": "35938d306ee0ca303e4598b8e462541e049f287b26a9348626fa08f1f9b63be2" } } ], "extra": [ 2, 33, 0, 134, 194, 177, 150, 104, 29, 210, 187, 140, 209, 65, 240, 9, 236, 119, 29, 107, 4, 223, 62, 247, 234, 25, 147, 181, 197, 60, 132, 129, 57, 132, 71, 1, 213, 207, 179, 13, 187, 161, 32, 182, 96, 60, 19, 129, 47, 163, 97, 30, 167, 144, 37, 127, 116, 232, 50, 223, 220, 48, 14, 13, 25, 103, 111, 29 ], "signatures": [ "2e205549a1246f9d533f3fd40823984a0d3669f8c78d17b7afac8a31d2f1030fd9cdc359a64c07e836dd5b7d580b07e6d9a2b367e2638d4739b8def3a38cdf03a47b59cc0d0318c11f8231bfd951f254eb4de45b19bc3773e70138e9352f0e0c6b9c7e92facd198be57b2f232a012be1d9447be97efc40cbb5ba4e7da52577098fab6810dce0fd8dd570f1df9f947631d715ce9b99d0b392fa856ff4e842f30fad07bbc6fb81659e5ec442a258256063f229b3e1892af9f0520991cf5c44a300", "dd0d27fa1aab043104142574bf2b80fdccaa9a0af9260123add3a2a8b4faa40cdac782963d3d8fa1c6e8dd0455a3b8a461f627ca3b29e0b83e5acc346a2f690d36775d0316f43665a20057fd3c30d2a848bc729eca54cd2c9248d18061122704572028ca0fdfd8f0848cd39cf60127ab8f053faab658c57bfee9ec7817bc730f7641e9f33cc72789fd921dee97cba7c1ae564d0f2adc46e75bacbb46b0f7950510e8d583fe6c77d5ea552d1433232833b5125e9ad0dfae5e2bc084e72fd95d0e"] }


Less details
source code | moneroexplorer